Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3965-1 | ghostscript security update |
Debian DSA |
DSA-5808-1 | ghostscript security update |
Ubuntu USN |
USN-7103-1 | Ghostscript vulnerabilities |
Ubuntu USN |
USN-7138-1 | Ghostscript vulnerabilities |
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 14 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:10.0 |
Wed, 30 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Thu, 14 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux Suse Suse linux Enterprise High Performance Computing Suse linux Enterprise Server Suse linux Enterprise Server For Sap |
|
| CPEs | cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_high_performance_computing:12.0:sp5:*:*:-:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:*:*:* cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp5:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux Suse Suse linux Enterprise High Performance Computing Suse linux Enterprise Server Suse linux Enterprise Server For Sap |
Tue, 12 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Artifex
Artifex ghostscript |
|
| CPEs | cpe:2.3:a:artifex:ghostscript:10.04.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Artifex
Artifex ghostscript |
|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Sun, 10 Nov 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T22:19:52.060Z
Reserved: 2024-09-16T00:00:00.000Z
Link: CVE-2024-46953
Updated: 2024-11-12T20:19:46.348Z
Status : Modified
Published: 2024-11-10T22:15:12.750
Modified: 2025-11-03T23:16:11.553
Link: CVE-2024-46953
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN