[USN-3768-1] Ghostscript vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============8312742104630811344==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”csInkkyWShqnE60o49ZovX3mo5yrhJylj”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–csInkkyWShqnE60o49ZovX3mo5yrhJylj
Content-Type: multipart/mixed; boundary=”LhuakjWW1gyF8tIJBdWBSFgQRKOW0qCRt”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3768-1] Ghostscript vulnerabilities

–LhuakjWW1gyF8tIJBdWBSFgQRKOW0qCRt
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3768-1
September 19, 2018

ghostscript vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Ghostscript.

Software Description:
– ghostscript: PostScript and PDF interpreter

Details:

Tavis Ormandy discovered multiple security issues in Ghostscript. If a us=
er
or automated system were tricked into processing a specially crafted file=
,
a remote attacker could possibly use these issues to access arbitrary
files, execute arbitrary code, or cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
ghostscript 9.22~dfsg+1-0ubuntu1.2
libgs9 9.22~dfsg+1-0ubuntu1.2

Ubuntu 16.04 LTS:
ghostscript 9.18~dfsg~0-0ubuntu2.9
libgs9 9.18~dfsg~0-0ubuntu2.9

Ubuntu 14.04 LTS:
ghostscript 9.10~dfsg-0ubuntu10.13
libgs9 9.10~dfsg-0ubuntu10.13

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3768-1
CVE-2018-11645, CVE-2018-15908, CVE-2018-15909, CVE-2018-15910,
CVE-2018-15911, CVE-2018-16509, CVE-2018-16510, CVE-2018-16511,
CVE-2018-16513, CVE-2018-16539, CVE-2018-16540, CVE-2018-16541,
CVE-2018-16542, CVE-2018-16543, CVE-2018-16585, CVE-2018-16802

Package Information:
https://launchpad.net/ubuntu/+source/ghostscript/9.22~dfsg+1-0ubuntu1.2=

https://launchpad.net/ubuntu/+source/ghostscript/9.18~dfsg~0-0ubuntu2.9=

https://launchpad.net/ubuntu/+source/ghostscript/9.10~dfsg-0ubuntu10.13=

–LhuakjWW1gyF8tIJBdWBSFgQRKOW0qCRt–

–csInkkyWShqnE60o49ZovX3mo5yrhJylj
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=ojuO
—–END PGP SIGNATURE—–

–csInkkyWShqnE60o49ZovX3mo5yrhJylj–

–===============8312742104630811344==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============8312742104630811344==–