openSUSE Security Update: Security update for ghostscript ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:0421-1 Rating: moderate References: #1032138 #1032230 #1040643 #1050879 #1050887 #1050888 #1050889 #1050891 #1051184 Cross-References: CVE-2016-10219 CVE-2016-10317 CVE-2017-11714 CVE-2017-9216 CVE-2017-9612 CVE-2017-9726 CVE-2017-9727 CVE-2017-9739 CVE-2017-9835 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This update for ghostscript fixes several security issues: - CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1050879). - CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c which allowed for DoS (bsc#1040643). - CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c allowed remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document (bsc#1032230). - CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050891). - CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050889). - CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050888). - CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document (bsc#1050887). - CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state structure, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184). - CVE-2016-10219: The intersect function in base/gxfill.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file (bsc#1032138). This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-157=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (i586 x86_64): ghostscript-9.15-14.3.1 ghostscript-debuginfo-9.15-14.3.1 ghostscript-debugsource-9.15-14.3.1 ghostscript-devel-9.15-14.3.1 ghostscript-mini-9.15-14.3.1 ghostscript-mini-debuginfo-9.15-14.3.1 ghostscript-mini-debugsource-9.15-14.3.1 ghostscript-mini-devel-9.15-14.3.1 ghostscript-x11-9.15-14.3.1 ghostscript-x11-debuginfo-9.15-14.3.1 References: https://www.suse.com/security/cve/CVE-2016-10219.html https://www.suse.com/security/cve/CVE-2016-10317.html https://www.suse.com/security/cve/CVE-2017-11714.html https://www.suse.com/security/cve/CVE-2017-9216.html https://www.suse.com/security/cve/CVE-2017-9612.html https://www.suse.com/security/cve/CVE-2017-9726.html https://www.suse.com/security/cve/CVE-2017-9727.html https://www.suse.com/security/cve/CVE-2017-9739.html https://www.suse.com/security/cve/CVE-2017-9835.html https://bugzilla.suse.com/1032138 https://bugzilla.suse.com/1032230 https://bugzilla.suse.com/1040643 https://bugzilla.suse.com/1050879 https://bugzilla.suse.com/1050887 https://bugzilla.suse.com/1050888 https://bugzilla.suse.com/1050889 https://bugzilla.suse.com/1050891 https://bugzilla.suse.com/1051184