An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: vulnerable to OS command injection due to mishandles permission validation for pipe devices (CVE-2023-36664) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
ghostscript-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-0:9.54.0-10.el9_2.src.rpm
ghostscript-debuginfo-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-debugsource-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-doc-0:9.54.0-10.el9_2.noarch.rpm
ghostscript-tools-dvipdf-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-tools-fonts-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-tools-printing-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-x11-0:9.54.0-10.el9_2.aarch64.rpm
ghostscript-x11-debuginfo-0:9.54.0-10.el9_2.aarch64.rpm
libgs-0:9.54.0-10.el9_2.aarch64.rpm
libgs-debuginfo-0:9.54.0-10.el9_2.aarch64.rpm
libgs-devel-0:9.54.0-10.el9_2.aarch64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664
https://bugzilla.redhat.com/show_bug.cgi?id=2217798