Monday, August 28, 2017

USN-3403-1: Ghostscript vulnerabilities

Ubuntu Security Notice USN-3403-1

28th August, 2017

ghostscript vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Ghostscript.

Software description

  • ghostscript - PostScript and PDF interpreter

Details

Kamil Frankowicz discovered that Ghostscript mishandles references.
A remote attacker could use this to cause a denial of service.
(CVE-2017-11714)

Kim Gwan Yeong discovered that Ghostscript could allow a heap-based buffer
over-read and application crash. A remote attacker could use a crafted
document to cause a denial of service. (CVE-2017-9611, CVE-2017-9726,
CVE-2017-9727, CVE-2017-9739)

Kim Gwan Yeong discovered an use-after-free vulnerability in Ghostscript.
A remote attacker could use a crafted file to cause a denial of service.
(CVE-2017-9612)

Kim Gwan Yeong discovered a lack of integer overflow check in Ghostscript.
A remote attacker could use crafted PostScript document to cause a denial
of service. (CVE-2017-9835)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.04:
ghostscript-x 9.19~dfsg+1-0ubuntu7.6
ghostscript 9.19~dfsg+1-0ubuntu7.6
libgs9 9.19~dfsg+1-0ubuntu7.6
libgs9-common 9.19~dfsg+1-0ubuntu7.6
Ubuntu 16.04 LTS:
ghostscript-x 9.18~dfsg~0-0ubuntu2.7
ghostscript 9.18~dfsg~0-0ubuntu2.7
libgs9 9.18~dfsg~0-0ubuntu2.7
libgs9-common 9.18~dfsg~0-0ubuntu2.7
Ubuntu 14.04 LTS:
ghostscript-x 9.10~dfsg-0ubuntu10.10
ghostscript 9.10~dfsg-0ubuntu10.10
libgs9 9.10~dfsg-0ubuntu10.10
libgs9-common 9.10~dfsg-0ubuntu10.10

To update your system, please follow these instructions: http://ift.tt/17VXqjU.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-11714, CVE-2017-9611, CVE-2017-9612, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739, CVE-2017-9835



from Ubuntu Security Notices http://ift.tt/2xGLP87

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.