Security update for ghostscript

Announcement ID: SUSE-SU-2018:4087-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2018-17183 ( SUSE ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-17183 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2018-17961 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-17961 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-18073 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-18073 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
  • CVE-2018-18073 ( NVD ): 6.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
  • CVE-2018-18284 ( SUSE ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
  • CVE-2018-18284 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • CVE-2018-19409 ( SUSE ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  • CVE-2018-19409 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-19475 ( SUSE ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  • CVE-2018-19475 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2018-19476 ( SUSE ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  • CVE-2018-19476 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2018-19477 ( SUSE ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  • CVE-2018-19477 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
  • Basesystem Module 15
  • Desktop Applications Module 15
  • SUSE Linux Enterprise Desktop 15
  • SUSE Linux Enterprise High Performance Computing 15
  • SUSE Linux Enterprise Server 15
  • SUSE Linux Enterprise Server for SAP Applications 15

An update that solves eight vulnerabilities and has one security fix can now be installed.

Description:

This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

  • CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
  • CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
  • CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
  • CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
  • CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
  • CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
  • CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
  • CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

  • Security issues have been the primary focus
  • Minor bug fixes and improvements
  • For release summary see: http://www.ghostscript.com/doc/9.26/News.htm

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • Basesystem Module 15
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-2914=1
  • Desktop Applications Module 15
    zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-2914=1

Package List:

  • Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
    • ghostscript-debugsource-9.26-3.9.4
    • ghostscript-debuginfo-9.26-3.9.4
    • ghostscript-x11-9.26-3.9.4
    • ghostscript-devel-9.26-3.9.4
    • ghostscript-x11-debuginfo-9.26-3.9.4
    • ghostscript-9.26-3.9.4
  • Desktop Applications Module 15 (aarch64 ppc64le s390x x86_64)
    • libspectre-debugsource-0.2.8-3.4.3
    • libspectre-devel-0.2.8-3.4.3
    • libspectre1-0.2.8-3.4.3
    • libspectre1-debuginfo-0.2.8-3.4.3

References: