MGASA-2018-0378 - Updated ghostscript packages fix security vulnerabilities

Publication date: 20 Sep 2018
URL: https://advisories.mageia.org/MGASA-2018-0378.html
Type: security
Affected Mageia releases: 6
CVE: CVE-2018-15908,
     CVE-2018-15909,
     CVE-2018-15910,
     CVE-2018-15911,
     CVE-2018-16509,
     CVE-2018-16510,
     CVE-2018-16511,
     CVE-2018-16513,
     CVE-2018-16539,
     CVE-2018-16540,
     CVE-2018-16541,
     CVE-2018-16542,
     CVE-2018-16543,
     CVE-2018-16802

Updated ghostscript packages fix several security vulnerabilities
including:

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply
malicious PostScript files to bypass .tempfile restrictions and write files
(CVE-2018-15908).

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the
.shfill operator could be used by attackers able to supply crafted PostScript
files to crash the interpreter or potentially execute code (CVE-2018-15909).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the LockDistillerParams
parameter to crash the interpreter or execute code (CVE-2018-15910).

In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply
crafted PostScript could use uninitialized memory access in the aesdecode
operator to crash the interpreter or potentially execute code
(CVE-2018-15911).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect 
"restoration of privilege" checking during handling of /invalidaccess
exceptions could be used by attackers able to supply crafted PostScript
to execute code using the "pipe" instruction (CVE-2018-16509).

An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec
stack handling in the "CS" and "SC" PDF primitives could be used by remote
attackers able to supply crafted PDFs to crash the interpreter or possibly
have unspecified other impact (CVE-2018-16510).

An issue was discovered in Artifex Ghostscript before 9.24. A type
confusion in "ztype" could be used by remote attackers able to supply
crafted PostScript to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16511).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use a type confusion in the setcolor function to
crash the interpreter or possibly have unspecified other impact
(CVE-2018-16513).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect access checking in temp file handling
to disclose contents of files on the system otherwise not readable
(CVE-2018-16539).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files to the builtin PDF14 converter could use a use-after-free
in copydevice handling to crash the interpreter or possibly have unspecified
other impact (CVE-2018-16540).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use incorrect free logic in pagedevice replacement
to crash the interpreter (CVE-2018-16541).

In Artifex Ghostscript before 9.24, attackers able to supply crafted
PostScript files could use insufficient interpreter stack-size checking
during error handling to crash the interpreter (CVE-2018-16542).

In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution
allow attackers to have an unspecified impact (CVE-2018-16543).

An issue was discovered in Artifex Ghostscript before 9.25. Incorrect
"restoration of privilege" checking when running out of stack during
exception handling could be used by attackers able to supply crafted
PostScript to execute code using the "pipe" instruction. This is due to
an incomplete fix for CVE-2018-16509 (CVE-2018-16802).

GS Bug 699663 : .setdistillerkeys memory corruption. (CVE Requested)

GS Bug 699699 : Crash upon bogus input argument

GS Bug 699719: Fix @ files in arg handling

GS Bug 699711: Review arg_next to ensure that NULL arg returns are coped with

GS Bug Fix SEGV seen in all-devices test with plank examples/ridt91.eps

GS Bug 699708 (part 1): 'Hide' non-replaceable error handlers for SAFER

GS Bug 699707: Security review bug - continuation procedures

References:
- https://bugs.mageia.org/show_bug.cgi?id=23526
- - https://www.openwall.com/lists/oss-security/2018/09/05/3
- https://www.openwall.com/lists/oss-security/2018/09/06/3
- https://www.openwall.com/lists/oss-security/2018/09/09/1
- https://www.openwall.com/lists/oss-security/2018/09/09/2
- https://www.openwall.com/lists/oss-security/2018/09/11/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802

SRPMS:
- 6/core/ghostscript-9.24-1.5.mga6

Mageia 2018-0378: ghostscript security update

Updated ghostscript packages fix several security vulnerabilities including: In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files...

Summary

Updated ghostscript packages fix several security vulnerabilities including:
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files (CVE-2018-15908).
In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code (CVE-2018-15909).
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code (CVE-2018-15910).
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code (CVE-2018-15911).
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction (CVE-2018-16509).
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact (CVE-2018-16510).
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact (CVE-2018-16511).
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact (CVE-2018-16513).
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable (CVE-2018-16539).
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact (CVE-2018-16540).
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter (CVE-2018-16541).
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter (CVE-2018-16542).
In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact (CVE-2018-16543).
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509 (CVE-2018-16802).
GS Bug 699663 : .setdistillerkeys memory corruption. (CVE Requested)
GS Bug 699699 : Crash upon bogus input argument
GS Bug 699719: Fix @ files in arg handling
GS Bug 699711: Review arg_next to ensure that NULL arg returns are coped with
GS Bug Fix SEGV seen in all-devices test with plank examples/ridt91.eps
GS Bug 699708 (part 1): 'Hide' non-replaceable error handlers for SAFER
GS Bug 699707: Security review bug - continuation procedures

References

- https://bugs.mageia.org/show_bug.cgi?id=23526

- - https://www.openwall.com/lists/oss-security/2018/09/05/3

- https://www.openwall.com/lists/oss-security/2018/09/06/3

- https://www.openwall.com/lists/oss-security/2018/09/09/1

- https://www.openwall.com/lists/oss-security/2018/09/09/2

- https://www.openwall.com/lists/oss-security/2018/09/11/1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802

Resolution

MGASA-2018-0378 - Updated ghostscript packages fix security vulnerabilities

SRPMS

- 6/core/ghostscript-9.24-1.5.mga6

Severity
Publication date: 20 Sep 2018
URL: https://advisories.mageia.org/MGASA-2018-0378.html
Type: security
CVE: CVE-2018-15908, CVE-2018-15909, CVE-2018-15910, CVE-2018-15911, CVE-2018-16509, CVE-2018-16510, CVE-2018-16511, CVE-2018-16513, CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542, CVE-2018-16543, CVE-2018-16802

Related News