ELSA-2024-3999

ELSA-2024-3999 - ghostscript security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2024-06-20

Description


[9.54.0-16]
- RHEL-39110 fix regression discovered in OPVP device

[9.54.0-15]
- RHEL-39110 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library


Related CVEs


CVE-2024-33871

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) ghostscript-9.54.0-16.el9_4.src.rpm0d5f86d14822c322113554907337b3d56fa1f898063ffae5a07a49efa6e7d1db-ol9_aarch64_appstream
ghostscript-9.54.0-16.el9_4.src.rpm0d5f86d14822c322113554907337b3d56fa1f898063ffae5a07a49efa6e7d1db-ol9_aarch64_codeready_builder
ghostscript-9.54.0-16.el9_4.aarch64.rpmaa56d462f7d11b5bd1a4d283a9950359fe6a5d6d28d027d7aca7cee2a7f0ff13-ol9_aarch64_appstream
ghostscript-doc-9.54.0-16.el9_4.noarch.rpm602a13b2aa6253bcc62dc09fe2e089f521d7e674db9d97a63915af8bfe9945a2-ol9_aarch64_appstream
ghostscript-tools-dvipdf-9.54.0-16.el9_4.aarch64.rpmf0c30ff901906d90943e4d069a934a8feaba835ce35bd1a0e78c31ae293ff6b3-ol9_aarch64_appstream
ghostscript-tools-fonts-9.54.0-16.el9_4.aarch64.rpmd1784a31d64788a2cdf6da3921e539584aae683959433ca9a7438a4cafb355f4-ol9_aarch64_appstream
ghostscript-tools-printing-9.54.0-16.el9_4.aarch64.rpmac2fb718e53ed91af21163f48a45bae51e84388714df50c1194ff4e48b2d1f61-ol9_aarch64_appstream
ghostscript-x11-9.54.0-16.el9_4.aarch64.rpm8c5554bde15819557846ff12ac06c3c9ac5edbb2da36b458551c5ba41963bd9e-ol9_aarch64_appstream
libgs-9.54.0-16.el9_4.aarch64.rpme24e8d9bbf8bc5efbf2a48583353a43ce4acc93869f0aa201c0bffaabd1958e3-ol9_aarch64_appstream
libgs-devel-9.54.0-16.el9_4.aarch64.rpmf3e6eb67507c238198b322f7992f0235609ec9554174d33543c55be0e8a6bc37-ol9_aarch64_codeready_builder
Oracle Linux 9 (x86_64) ghostscript-9.54.0-16.el9_4.src.rpm0d5f86d14822c322113554907337b3d56fa1f898063ffae5a07a49efa6e7d1db-ol9_x86_64_appstream
ghostscript-9.54.0-16.el9_4.src.rpm0d5f86d14822c322113554907337b3d56fa1f898063ffae5a07a49efa6e7d1db-ol9_x86_64_codeready_builder
ghostscript-9.54.0-16.el9_4.i686.rpmf592896c7c5bf65cc64946966b7eb80cdc5bb5b2b51c2432e52a4c05b50585c0-ol9_x86_64_codeready_builder
ghostscript-9.54.0-16.el9_4.x86_64.rpmbb5d39e5908669c55af9ed15b0c526c9e0b77d005cea0226f2281a4990c61d93-ol9_x86_64_appstream
ghostscript-doc-9.54.0-16.el9_4.noarch.rpm602a13b2aa6253bcc62dc09fe2e089f521d7e674db9d97a63915af8bfe9945a2-ol9_x86_64_appstream
ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm1d4279ca337793cc2e8e764813ce33b739aa2279068b9afc339a80ef19e9c512-ol9_x86_64_appstream
ghostscript-tools-fonts-9.54.0-16.el9_4.i686.rpm260bbaf82ecfc4f4ec29aab965022b8d91031b359398f5fb0e52f65a2aa729a1-ol9_x86_64_codeready_builder
ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm8158b361077154758a1789fabce5dc73b3dd80c7ea09da0144d24feba3881990-ol9_x86_64_appstream
ghostscript-tools-printing-9.54.0-16.el9_4.i686.rpm259983119210541fa50700595af9255cbb6e217320e2e529cf769fad97d821cf-ol9_x86_64_codeready_builder
ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm29f816aeacfdaab9d4c483e9a862945e4ab15a61452c41689e5ef4f0d74a0365-ol9_x86_64_appstream
ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm30a3efdf255eca84ae508f0354b1f9385a7dd4f38f00fe746c4aa85a25909d19-ol9_x86_64_appstream
libgs-9.54.0-16.el9_4.i686.rpmc1df9d5a079f290d400a8ff9fe15ffa9db0d0b62528b7a20605eac735798e5d4-ol9_x86_64_appstream
libgs-9.54.0-16.el9_4.x86_64.rpm8446a2581617337c10773dabeb1ede9de2dcfa984348625c56287e101ed2d444-ol9_x86_64_appstream
libgs-devel-9.54.0-16.el9_4.i686.rpmf9fa32209fea439f09d74672a83f5185083d072bf57ea26869cbe1523354a5d0-ol9_x86_64_codeready_builder
libgs-devel-9.54.0-16.el9_4.x86_64.rpmd417b2e38960394a03dd04ea467c598ec5076c1318ae64eba6d6f19895e2d72e-ol9_x86_64_codeready_builder



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete