CVE-2023-43115

NameCVE-2023-43115
DescriptionIn Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ghostscript (PTS)buster9.27~dfsg-2+deb10u5vulnerable
buster (security)9.27~dfsg-2+deb10u9vulnerable
bullseye9.53.3~dfsg-7+deb11u4vulnerable
bullseye (security)9.53.3~dfsg-7+deb11u5vulnerable
bookworm, bookworm (security)10.0.0~dfsg-11+deb12u1vulnerable
trixie10.01.2~dfsg-1vulnerable
sid10.02.0~dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ghostscriptsource(unstable)10.02.0~dfsg-1

Notes

[bookworm] - ghostscript <no-dsa> (Minor issue; documented risks, can be fixed in later update)
[bullseye] - ghostscript <no-dsa> (Minor issue; documented risks, can be fixed in later update)
[buster] - ghostscript <ignored> (Minor issue; documented risks, have done refactoring in later versions)
https://bugs.ghostscript.com/show_bug.cgi?id=707051
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8b0f20002536867bd73ff4552408a72597190cbe (ghostpdl-10.02.0rc2)

Search for package or bug name: Reporting problems