Ubuntu Security Notice USN-3403-1
28th August, 2017
ghostscript vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in Ghostscript.
Software description
- ghostscript - PostScript and PDF interpreter
Details
Kamil Frankowicz discovered that Ghostscript mishandles references.
A remote attacker could use this to cause a denial of service.
(CVE-2017-11714)
Kim Gwan Yeong discovered that Ghostscript could allow a heap-based buffer
over-read and application crash. A remote attacker could use a crafted
document to cause a denial of service. (CVE-2017-9611, CVE-2017-9726,
CVE-2017-9727, CVE-2017-9739)
Kim Gwan Yeong discovered an use-after-free vulnerability in Ghostscript.
A remote attacker could use a crafted file to cause a denial of service.
(CVE-2017-9612)
Kim Gwan Yeong discovered a lack of integer overflow check in Ghostscript.
A remote attacker could use crafted PostScript document to cause a denial
of service. (CVE-2017-9835)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 17.04:
- ghostscript-x 9.19~dfsg+1-0ubuntu7.6
- ghostscript 9.19~dfsg+1-0ubuntu7.6
- libgs9 9.19~dfsg+1-0ubuntu7.6
- libgs9-common 9.19~dfsg+1-0ubuntu7.6
- Ubuntu 16.04 LTS:
- ghostscript-x 9.18~dfsg~0-0ubuntu2.7
- ghostscript 9.18~dfsg~0-0ubuntu2.7
- libgs9 9.18~dfsg~0-0ubuntu2.7
- libgs9-common 9.18~dfsg~0-0ubuntu2.7
- Ubuntu 14.04 LTS:
- ghostscript-x 9.10~dfsg-0ubuntu10.10
- ghostscript 9.10~dfsg-0ubuntu10.10
- libgs9 9.10~dfsg-0ubuntu10.10
- libgs9-common 9.10~dfsg-0ubuntu10.10
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
In general, a standard system update will make all the necessary changes.
References
CVE-2017-11714, CVE-2017-9611, CVE-2017-9612, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739, CVE-2017-9835
from Ubuntu Security Notices http://ift.tt/2xGLP87
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.