[USN-3148-1] Ghostscript vulnerabilities

Emily Ratliff emily.ratliff at canonical.com
Fri Dec 2 02:17:26 UTC 2016


==========================================================================
Ubuntu Security Notice USN-3148-1
December 02, 2016

ghostscript vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Ghostscript could be made to crash, run programs, or disclose sensitive
information if it processed a specially crafted file.

Software Description:
- ghostscript: PostScript and PDF interpreter

Details:

Tavis Ormandy discovered multiple vulnerabilities in the way that Ghostscript
processes certain Postscript files. If a user or automated system were tricked
into opening a specially crafted file, an attacker could cause a denial of
service or possibly execute arbitrary code. (CVE-2016-7976, CVE-2016-7978,
CVE-2016-7979, CVE-2016-8602)

Multiple vulnerabilities were discovered in Ghostscript related to information
disclosure. If a user or automated system were tricked into opening a specially
crafted file, an attacker could expose sensitive data. (CVE-2013-5653,
CVE-2016-7977)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
  ghostscript                     9.19~dfsg+1-0ubuntu6.2
  ghostscript-x                   9.19~dfsg+1-0ubuntu6.2
  libgs9                          9.19~dfsg+1-0ubuntu6.2
  libgs9-common                   9.19~dfsg+1-0ubuntu6.2

Ubuntu 16.04 LTS:
  ghostscript                     9.18~dfsg~0-0ubuntu2.2
  ghostscript-x                   9.18~dfsg~0-0ubuntu2.2
  libgs9                          9.18~dfsg~0-0ubuntu2.2
  libgs9-common                   9.18~dfsg~0-0ubuntu2.2

Ubuntu 14.04 LTS:
  ghostscript                     9.10~dfsg-0ubuntu10.5
  ghostscript-x                   9.10~dfsg-0ubuntu10.5
  libgs9                          9.10~dfsg-0ubuntu10.5
  libgs9-common                   9.10~dfsg-0ubuntu10.5

Ubuntu 12.04 LTS:
  ghostscript                     9.05~dfsg-0ubuntu4.4
  ghostscript-x                   9.05~dfsg-0ubuntu4.4
  libgs9                          9.05~dfsg-0ubuntu4.4
  libgs9-common                   9.05~dfsg-0ubuntu4.4

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-3148-1
  CVE-2013-5653, CVE-2016-7976, CVE-2016-7977, CVE-2016-7978,
  CVE-2016-7979, CVE-2016-8602

Package Information:
  https://launchpad.net/ubuntu/+source/ghostscript/9.19~dfsg+1-0ubuntu6.2
  https://launchpad.net/ubuntu/+source/ghostscript/9.18~dfsg~0-0ubuntu2.2
  https://launchpad.net/ubuntu/+source/ghostscript/9.10~dfsg-0ubuntu10.5
  https://launchpad.net/ubuntu/+source/ghostscript/9.05~dfsg-0ubuntu4.4
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20161201/49f0a047/attachment.sig>


More information about the ubuntu-security-announce mailing list