MGASA-2018-0378

Source
https://advisories.mageia.org/MGASA-2018-0378.html
Import Source
https://advisories.mageia.org/MGASA-2018-0378.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0378
Related
Published
2018-09-20T23:17:55Z
Modified
2018-09-20T22:55:44Z
Summary
Updated ghostscript packages fix security vulnerabilities
Details

Updated ghostscript packages fix several security vulnerabilities including:

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files (CVE-2018-15908).

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code (CVE-2018-15909).

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code (CVE-2018-15910).

In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code (CVE-2018-15911).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction (CVE-2018-16509).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact (CVE-2018-16510).

An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact (CVE-2018-16511).

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact (CVE-2018-16513).

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable (CVE-2018-16539).

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact (CVE-2018-16540).

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter (CVE-2018-16541).

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter (CVE-2018-16542).

In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact (CVE-2018-16543).

An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509 (CVE-2018-16802).

GS Bug 699663 : .setdistillerkeys memory corruption. (CVE Requested)

GS Bug 699699 : Crash upon bogus input argument

GS Bug 699719: Fix @ files in arg handling

GS Bug 699711: Review arg_next to ensure that NULL arg returns are coped with

GS Bug Fix SEGV seen in all-devices test with plank examples/ridt91.eps

GS Bug 699708 (part 1): 'Hide' non-replaceable error handlers for SAFER

GS Bug 699707: Security review bug - continuation procedures

References
Credits

Affected packages

Mageia:6 / ghostscript

Package

Name
ghostscript
Purl
pkg:rpm/mageia/ghostscript?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.24-1.5.mga6

Ecosystem specific

{
    "section": "core"
}