Arch Linux Security Advisory ASA-201901-18
=========================================
Severity: High
Date    : 2019-01-29
CVE-ID  : CVE-2019-6116
Package : ghostscript
Type    : sandbox escape
Remote  : Yes
Link    : https://security.archlinux.org/AVG-860

Summary
======
The package ghostscript before version 9.26-2 is vulnerable to sandbox
escape.

Resolution
=========
Upgrade to 9.26-2.

# pacman -Syu "ghostscript>=9.26-2"

The problem has been fixed upstream but no release is available yet.

Workaround
=========
None.

Description
==========
It was found that ghostscript could leak sensitive operators on the
operand stack when a pseudo-operator pushes a subroutine. A specially
crafted PostScript file could use this flaw to escape the -dSAFER
protection in order to, for example, have access to the file system and
execute commands.

Impact
=====
A remote attacker is able to escape the sandbox via a specially crafted
PostScript document.

References
=========
https://marc.info/?l=oss-security&m=154825433813390
https://bugs.chromium.org/p/project-zero/issues/detail?id=1729&desc=2
https://bugs.ghostscript.com/show_bug.cgi?id=700317
https://git.ghostscript.com/;a=commitdiff;h=13b0a36f8181db66a91bcc8cea139998b53a8996
https://git.ghostscript.com/;a=commitdiff;h=2db98f9c66135601efb103d8db7d020a672308db
https://git.ghostscript.com/;a=commitdiff;h=99f13091a3f309bdc95d275ea9fec10bb9f42d9a
https://git.ghostscript.com/;a=commitdiff;h=59d8f4deef90c1598ff50616519d5576756b4495
https://git.ghostscript.com/;a=commitdiff;h=2768d1a6dddb83f5c061207a7ed2813999c1b5c9
https://git.ghostscript.com/;a=commitdiff;h=49c8092da88ef6bb0aa281fe294ae0925a44b5b9
https://security.archlinux.org/CVE-2019-6116

ArchLinux: 201901-18: ghostscript: sandbox escape

January 31, 2019

Summary

It was found that ghostscript could leak sensitive operators on the operand stack when a pseudo-operator pushes a subroutine. A specially crafted PostScript file could use this flaw to escape the -dSAFER protection in order to, for example, have access to the file system and execute commands.

Resolution

Upgrade to 9.26-2. # pacman -Syu "ghostscript>=9.26-2"
The problem has been fixed upstream but no release is available yet.

References

https://marc.info/?l=oss-security&m=154825433813390 https://bugs.chromium.org/p/project-zero/issues/detail?id=1729&desc=2 https://bugs.ghostscript.com/show_bug.cgi?id=700317 https://git.ghostscript.com/;a=commitdiff;h=13b0a36f8181db66a91bcc8cea139998b53a8996 https://git.ghostscript.com/;a=commitdiff;h=2db98f9c66135601efb103d8db7d020a672308db https://git.ghostscript.com/;a=commitdiff;h=99f13091a3f309bdc95d275ea9fec10bb9f42d9a https://git.ghostscript.com/;a=commitdiff;h=59d8f4deef90c1598ff50616519d5576756b4495 https://git.ghostscript.com/;a=commitdiff;h=2768d1a6dddb83f5c061207a7ed2813999c1b5c9 https://git.ghostscript.com/;a=commitdiff;h=49c8092da88ef6bb0aa281fe294ae0925a44b5b9 https://security.archlinux.org/CVE-2019-6116

Severity
Package : ghostscript
Type : sandbox escape
Remote : Yes
Link : https://security.archlinux.org/AVG-860

Workaround

None.

Related News