Security update for ghostscript

SUSE Security Update: Security update for ghostscript
Announcement ID: SUSE-SU-2019:2478-1
Rating: important
References: #1129180 #1131863 #1134156 #1140359 #1146882 #1146884
Cross-References:CVE-2019-12973 CVE-2019-14811 CVE-2019-14812 CVE-2019-14813 CVE-2019-14817 CVE-2019-3835 CVE-2019-3839
Affected Products:
  • SUSE OpenStack Cloud Crowbar 8
  • SUSE OpenStack Cloud 8
  • SUSE OpenStack Cloud 7
  • SUSE Linux Enterprise Software Development Kit 12-SP5
  • SUSE Linux Enterprise Software Development Kit 12-SP4
  • SUSE Linux Enterprise Server for SAP 12-SP3
  • SUSE Linux Enterprise Server for SAP 12-SP2
  • SUSE Linux Enterprise Server for SAP 12-SP1
  • SUSE Linux Enterprise Server 12-SP5
  • SUSE Linux Enterprise Server 12-SP4
  • SUSE Linux Enterprise Server 12-SP3-LTSS
  • SUSE Linux Enterprise Server 12-SP3-BCL
  • SUSE Linux Enterprise Server 12-SP2-LTSS
  • SUSE Linux Enterprise Server 12-SP2-BCL
  • SUSE Linux Enterprise Server 12-SP1-LTSS
  • SUSE Linux Enterprise Desktop 12-SP5
  • SUSE Linux Enterprise Desktop 12-SP4
  • SUSE Enterprise Storage 5
  • SUSE Enterprise Storage 4
  • HPE Helion Openstack 8

An update that fixes 7 vulnerabilities is now available.

Description:

This update for ghostscript to 9.27 fixes the following issues:
Security issues fixed:

  • CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator. (bsc#1129180)
  • CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
  • CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
  • CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
  • CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
  • CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
  • CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2019-2478=1
  • SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2019-2478=1
  • SUSE OpenStack Cloud 7:
    zypper in -t patch SUSE-OpenStack-Cloud-7-2019-2478=1
  • SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2019-2478=1
  • SUSE Linux Enterprise Software Development Kit 12-SP4:
    zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-2478=1
  • SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2019-2478=1
  • SUSE Linux Enterprise Server for SAP 12-SP2:
    zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-2478=1
  • SUSE Linux Enterprise Server for SAP 12-SP1:
    zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP4:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP2-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP2-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-2478=1
  • SUSE Linux Enterprise Server 12-SP1-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-2478=1
  • SUSE Linux Enterprise Desktop 12-SP5:
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP5-2019-2478=1
  • SUSE Linux Enterprise Desktop 12-SP4:
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-2478=1
  • SUSE Enterprise Storage 5:
    zypper in -t patch SUSE-Storage-5-2019-2478=1
  • SUSE Enterprise Storage 4:
    zypper in -t patch SUSE-Storage-4-2019-2478=1
  • HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2019-2478=1

Package List:

  • SUSE OpenStack Cloud Crowbar 8 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE OpenStack Cloud 8 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE OpenStack Cloud 7 (s390x x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-devel-9.27-23.28.1
  • SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-devel-9.27-23.28.1
  • SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Desktop 12-SP5 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Enterprise Storage 5 (aarch64 x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • SUSE Enterprise Storage 4 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1
  • HPE Helion Openstack 8 (x86_64):
    • ghostscript-9.27-23.28.1
    • ghostscript-debuginfo-9.27-23.28.1
    • ghostscript-debugsource-9.27-23.28.1
    • ghostscript-x11-9.27-23.28.1
    • ghostscript-x11-debuginfo-9.27-23.28.1

References: