[USN-6897-1] Ghostscript vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Mon Jul 15 14:18:52 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6897-1
July 15, 2024

ghostscript vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Ghostscript.

Software Description:
- ghostscript: PostScript and PDF interpreter

Details:

It was discovered that Ghostscript incorrectly handled certain long PDF
filter names. An attacker could possibly use this issue to cause
Ghostscript to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29506)

It was discovered that Ghostscript incorrectly handled certain API
parameters. An attacker could possibly use this issue to cause Ghostscript
to crash, resulting in a denial of service. This issue only affected Ubuntu
24.04 LTS. (CVE-2024-29507)

It was discovered that Ghostscript incorrectly handled certain BaseFont
names. An attacker could use this issue to cause Ghostscript to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2024-29508)

It was discovered that Ghostscript incorrectly handled certain PDF
passwords that contained NULL bytes. An attacker could use this issue to
cause Ghostscript to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2024-29509)

It was discovered that Ghostscript incorrectly handled certain certain file
paths when doing OCR. An attacker could use this issue to read arbitrary
files and write error messages to arbitrary files. This issue only affected
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29511)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
   ghostscript                     10.02.1~dfsg1-0ubuntu7.3
   libgs10                         10.02.1~dfsg1-0ubuntu7.3

Ubuntu 22.04 LTS
   ghostscript                     9.55.0~dfsg1-0ubuntu5.9
   libgs9                          9.55.0~dfsg1-0ubuntu5.9

Ubuntu 20.04 LTS
   ghostscript                     9.50~dfsg-5ubuntu4.13
   libgs9                          9.50~dfsg-5ubuntu4.13

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6897-1
   CVE-2024-29506, CVE-2024-29507, CVE-2024-29508, CVE-2024-29509,
   CVE-2024-29511

Package Information:
   https://launchpad.net/ubuntu/+source/ghostscript/10.02.1~dfsg1-0ubuntu7.3
   https://launchpad.net/ubuntu/+source/ghostscript/9.55.0~dfsg1-0ubuntu5.9
   https://launchpad.net/ubuntu/+source/ghostscript/9.50~dfsg-5ubuntu4.13

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240715/483c212a/attachment.sig>


More information about the ubuntu-security-announce mailing list