Advisories ยป MGASA-2018-0378

Updated ghostscript packages fix security vulnerabilities

Publication date: 20 Sep 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-15908 , CVE-2018-15909 , CVE-2018-15910 , CVE-2018-15911 , CVE-2018-16509 , CVE-2018-16510 , CVE-2018-16511 , CVE-2018-16513 , CVE-2018-16539 , CVE-2018-16540 , CVE-2018-16541 , CVE-2018-16542 , CVE-2018-16543 , CVE-2018-16802

Description

Updated ghostscript packages fix several security vulnerabilities
including:

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply
malicious PostScript files to bypass .tempfile restrictions and write files
(CVE-2018-15908).

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the
.shfill operator could be used by attackers able to supply crafted PostScript
files to crash the interpreter or potentially execute code (CVE-2018-15909).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the LockDistillerParams
parameter to crash the interpreter or execute code (CVE-2018-15910).

In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply
crafted PostScript could use uninitialized memory access in the aesdecode
operator to crash the interpreter or potentially execute code
(CVE-2018-15911).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect 
"restoration of privilege" checking during handling of /invalidaccess
exceptions could be used by attackers able to supply crafted PostScript
to execute code using the "pipe" instruction (CVE-2018-16509).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec
stack handling in the "CS" and "SC" PDF primitives could be used by remote
attackers able to supply crafted PDFs to crash the interpreter or possibly
have unspecified other impact (CVE-2018-16510).

An issue was discovered in Artifex Ghostscript before 9.24. A type
confusion in "ztype" could be used by remote attackers able to supply
crafted PostScript to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16511).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the setcolor function to
crash the interpreter or possibly have unspecified other impact
(CVE-2018-16513).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect access checking in temp file handling
to disclose contents of files on the system otherwise not readable
(CVE-2018-16539).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files to the builtin PDF14 converter could use a use-after-free
in copydevice handling to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16540).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect free logic in pagedevice replacement
to crash the interpreter (CVE-2018-16541).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use insufficient interpreter stack-size checking
during error handling to crash the interpreter (CVE-2018-16542).

In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution
allow attackers to have an unspecified impact (CVE-2018-16543).

An issue was discovered in Artifex Ghostscript before 9.25. Incorrect
"restoration of privilege" checking when running out of stack during
exception handling could be used by attackers able to supply crafted
PostScript to execute code using the "pipe" instruction. This is due to
an incomplete fix for CVE-2018-16509 (CVE-2018-16802).

GS Bug 699663 : .setdistillerkeys memory corruption. (CVE Requested)

GS Bug 699699 : Crash upon bogus input argument

GS Bug 699719: Fix @ files in arg handling

GS Bug 699711: Review arg_next to ensure that NULL arg returns are coped with

GS Bug Fix SEGV seen in all-devices test with plank examples/ridt91.eps

GS Bug 699708 (part 1): 'Hide' non-replaceable error handlers for SAFER

GS Bug 699707: Security review bug - continuation procedures
                

References

SRPMS

6/core