Updated ghostscript packages fix security vulnerabilities
Publication date: 20 Sep 2018Modification date: 20 Sep 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-15908 , CVE-2018-15909 , CVE-2018-15910 , CVE-2018-15911 , CVE-2018-16509 , CVE-2018-16510 , CVE-2018-16511 , CVE-2018-16513 , CVE-2018-16539 , CVE-2018-16540 , CVE-2018-16541 , CVE-2018-16542 , CVE-2018-16543 , CVE-2018-16802
Description
Updated ghostscript packages fix several security vulnerabilities including: In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files (CVE-2018-15908). In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code (CVE-2018-15909). In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code (CVE-2018-15910). In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code (CVE-2018-15911). An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction (CVE-2018-16509). An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact (CVE-2018-16510). An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact (CVE-2018-16511). In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact (CVE-2018-16513). In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable (CVE-2018-16539). In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact (CVE-2018-16540). In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter (CVE-2018-16541). In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter (CVE-2018-16542). In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact (CVE-2018-16543). An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509 (CVE-2018-16802). GS Bug 699663 : .setdistillerkeys memory corruption. (CVE Requested) GS Bug 699699 : Crash upon bogus input argument GS Bug 699719: Fix @ files in arg handling GS Bug 699711: Review arg_next to ensure that NULL arg returns are coped with GS Bug Fix SEGV seen in all-devices test with plank examples/ridt91.eps GS Bug 699708 (part 1): 'Hide' non-replaceable error handlers for SAFER GS Bug 699707: Security review bug - continuation procedures
References
- https://bugs.mageia.org/show_bug.cgi?id=23526
- https://www.ghostscript.com/doc/9.24/History9.htm#Version9.24
- http://openwall.com/lists/oss-security/2018/09/05/3
- http://openwall.com/lists/oss-security/2018/09/06/3
- http://openwall.com/lists/oss-security/2018/09/09/1
- http://openwall.com/lists/oss-security/2018/09/09/2
- http://openwall.com/lists/oss-security/2018/09/11/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802
SRPMS
6/core
- ghostscript-9.24-1.5.mga6