File _patchinfo of Package patchinfo.36165
<patchinfo incident="36165">
<issue tracker="cve" id="2024-46953"/>
<issue tracker="cve" id="2024-46956"/>
<issue tracker="cve" id="2024-46955"/>
<issue tracker="cve" id="2024-46951"/>
<issue tracker="bnc" id="1232265">VUL-0: CVE-2024-46951: ghostscript: Arbitrary code execution via unchecked "Implementation" pointer in "Pattern" color space</issue>
<issue tracker="bnc" id="1232267">VUL-0: CVE-2024-46953: ghostscript: An integer overflow when parsing the page format results in path truncation, path traversal, code execution</issue>
<issue tracker="bnc" id="1232270">VUL-0: CVE-2024-46956: ghostscript: Arbitrary code execution via out of bounds data access in filenameforall</issue>
<issue tracker="bnc" id="1232269">VUL-0: CVE-2024-46955: ghostscript: Out of bounds read when reading color in "Indexed" color space</issue>
<packager>jsmeix</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for ghostscript</summary>
<description>This update for ghostscript fixes the following issues:
- CVE-2024-46951: Fixed arbitrary code execution via unchecked "Implementation" pointer in "Pattern" color space (bsc#1232265).
- CVE-2024-46953: Fixed integer overflow when parsing the page format results in path truncation, path traversal, code execution (bsc#1232267).
- CVE-2024-46956: Fixed arbitrary code execution via out of bounds data access in filenameforall (bsc#1232270).
- CVE-2024-46955: Fixed out of bounds read when reading color in "Indexed" color space (bsc#1232269).
</description>
</patchinfo>