USN-3403-1: Ghostscript vulnerabilities
Ubuntu Security Notice USN-3403-1
28th August, 2017
ghostscript vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in Ghostscript.
Software description
- ghostscript
– PostScript and PDF interpreter
Details
Kamil Frankowicz discovered that Ghostscript mishandles references.
A remote attacker could use this to cause a denial of service.
(CVE-2017-11714)
Kim Gwan Yeong discovered that Ghostscript could allow a heap-based buffer
over-read and application crash. A remote attacker could use a crafted
document to cause a denial of service. (CVE-2017-9611, CVE-2017-9726,
CVE-2017-9727, CVE-2017-9739)
Kim Gwan Yeong discovered an use-after-free vulnerability in Ghostscript.
A remote attacker could use a crafted file to cause a denial of service.
(CVE-2017-9612)
Kim Gwan Yeong discovered a lack of integer overflow check in Ghostscript.
A remote attacker could use crafted PostScript document to cause a denial
of service. (CVE-2017-9835)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 17.04:
-
ghostscript-x
9.19~dfsg+1-0ubuntu7.6
-
ghostscript
9.19~dfsg+1-0ubuntu7.6
-
libgs9
9.19~dfsg+1-0ubuntu7.6
-
libgs9-common
9.19~dfsg+1-0ubuntu7.6
- Ubuntu 16.04 LTS:
-
ghostscript-x
9.18~dfsg~0-0ubuntu2.7
-
ghostscript
9.18~dfsg~0-0ubuntu2.7
-
libgs9
9.18~dfsg~0-0ubuntu2.7
-
libgs9-common
9.18~dfsg~0-0ubuntu2.7
- Ubuntu 14.04 LTS:
-
ghostscript-x
9.10~dfsg-0ubuntu10.10
-
ghostscript
9.10~dfsg-0ubuntu10.10
-
libgs9
9.10~dfsg-0ubuntu10.10
-
libgs9-common
9.10~dfsg-0ubuntu10.10
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
Leave a Reply