opensuse-su-2019:2222-1
Vulnerability from csaf_opensuse
Published
2019-09-30 14:22
Modified
2019-09-30 14:22
Summary
Security update for ghostscript
Notes
Title of the patch
Security update for ghostscript
Description of the patch
This update for ghostscript fixes the following issues:
Security issues fixed:
- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator. (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2222
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ghostscript",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ghostscript fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator. (bsc#1129180)\n- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)\n- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)\n- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)\n- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)\n- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)\n- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2222",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2222-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2222-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2222-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C"
},
{
"category": "self",
"summary": "SUSE Bug 1129180",
"url": "https://bugzilla.suse.com/1129180"
},
{
"category": "self",
"summary": "SUSE Bug 1129186",
"url": "https://bugzilla.suse.com/1129186"
},
{
"category": "self",
"summary": "SUSE Bug 1134156",
"url": "https://bugzilla.suse.com/1134156"
},
{
"category": "self",
"summary": "SUSE Bug 1140359",
"url": "https://bugzilla.suse.com/1140359"
},
{
"category": "self",
"summary": "SUSE Bug 1146882",
"url": "https://bugzilla.suse.com/1146882"
},
{
"category": "self",
"summary": "SUSE Bug 1146884",
"url": "https://bugzilla.suse.com/1146884"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12973 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14817 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3839 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3839/"
}
],
"title": "Security update for ghostscript",
"tracking": {
"current_release_date": "2019-09-30T14:22:56Z",
"generator": {
"date": "2019-09-30T14:22:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2222-1",
"initial_release_date": "2019-09-30T14:22:56Z",
"revision_history": [
{
"date": "2019-09-30T14:22:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.27-lp150.2.23.1.i586",
"product": {
"name": "ghostscript-9.27-lp150.2.23.1.i586",
"product_id": "ghostscript-9.27-lp150.2.23.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.27-lp150.2.23.1.i586",
"product": {
"name": "ghostscript-devel-9.27-lp150.2.23.1.i586",
"product_id": "ghostscript-devel-9.27-lp150.2.23.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.27-lp150.2.23.1.i586",
"product": {
"name": "ghostscript-mini-9.27-lp150.2.23.1.i586",
"product_id": "ghostscript-mini-9.27-lp150.2.23.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"product": {
"name": "ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"product_id": "ghostscript-mini-devel-9.27-lp150.2.23.1.i586"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.27-lp150.2.23.1.i586",
"product": {
"name": "ghostscript-x11-9.27-lp150.2.23.1.i586",
"product_id": "ghostscript-x11-9.27-lp150.2.23.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ghostscript-9.27-lp150.2.23.1.x86_64",
"product": {
"name": "ghostscript-9.27-lp150.2.23.1.x86_64",
"product_id": "ghostscript-9.27-lp150.2.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"product": {
"name": "ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"product_id": "ghostscript-devel-9.27-lp150.2.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"product": {
"name": "ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"product_id": "ghostscript-mini-9.27-lp150.2.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"product": {
"name": "ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"product_id": "ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "ghostscript-x11-9.27-lp150.2.23.1.x86_64",
"product": {
"name": "ghostscript-x11-9.27-lp150.2.23.1.x86_64",
"product_id": "ghostscript-x11-9.27-lp150.2.23.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.27-lp150.2.23.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586"
},
"product_reference": "ghostscript-9.27-lp150.2.23.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-9.27-lp150.2.23.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64"
},
"product_reference": "ghostscript-9.27-lp150.2.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.27-lp150.2.23.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586"
},
"product_reference": "ghostscript-devel-9.27-lp150.2.23.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-devel-9.27-lp150.2.23.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64"
},
"product_reference": "ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-mini-9.27-lp150.2.23.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586"
},
"product_reference": "ghostscript-mini-9.27-lp150.2.23.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-mini-9.27-lp150.2.23.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64"
},
"product_reference": "ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-mini-devel-9.27-lp150.2.23.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586"
},
"product_reference": "ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64"
},
"product_reference": "ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.27-lp150.2.23.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586"
},
"product_reference": "ghostscript-x11-9.27-lp150.2.23.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ghostscript-x11-9.27-lp150.2.23.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
},
"product_reference": "ghostscript-x11-9.27-lp150.2.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12973"
}
],
"notes": [
{
"category": "general",
"text": "In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12973",
"url": "https://www.suse.com/security/cve/CVE-2019-12973"
},
{
"category": "external",
"summary": "SUSE Bug 1140359 for CVE-2019-12973",
"url": "https://bugzilla.suse.com/1140359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-12973"
},
{
"cve": "CVE-2019-14811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14811"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14811",
"url": "https://www.suse.com/security/cve/CVE-2019-14811"
},
{
"category": "external",
"summary": "SUSE Bug 1146882 for CVE-2019-14811",
"url": "https://bugzilla.suse.com/1146882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-14811"
},
{
"cve": "CVE-2019-14812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14812"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14812",
"url": "https://www.suse.com/security/cve/CVE-2019-14812"
},
{
"category": "external",
"summary": "SUSE Bug 1146882 for CVE-2019-14812",
"url": "https://bugzilla.suse.com/1146882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-14812"
},
{
"cve": "CVE-2019-14813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14813"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14813",
"url": "https://www.suse.com/security/cve/CVE-2019-14813"
},
{
"category": "external",
"summary": "SUSE Bug 1146882 for CVE-2019-14813",
"url": "https://bugzilla.suse.com/1146882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-14813"
},
{
"cve": "CVE-2019-14817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14817"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14817",
"url": "https://www.suse.com/security/cve/CVE-2019-14817"
},
{
"category": "external",
"summary": "SUSE Bug 1146882 for CVE-2019-14817",
"url": "https://bugzilla.suse.com/1146882"
},
{
"category": "external",
"summary": "SUSE Bug 1146884 for CVE-2019-14817",
"url": "https://bugzilla.suse.com/1146884"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "moderate"
}
],
"title": "CVE-2019-14817"
},
{
"cve": "CVE-2019-3835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3835"
}
],
"notes": [
{
"category": "general",
"text": "It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3835",
"url": "https://www.suse.com/security/cve/CVE-2019-3835"
},
{
"category": "external",
"summary": "SUSE Bug 1129180 for CVE-2019-3835",
"url": "https://bugzilla.suse.com/1129180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "important"
}
],
"title": "CVE-2019-3835"
},
{
"cve": "CVE-2019-3839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3839"
}
],
"notes": [
{
"category": "general",
"text": "It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3839",
"url": "https://www.suse.com/security/cve/CVE-2019-3839"
},
{
"category": "external",
"summary": "SUSE Bug 1134156 for CVE-2019-3839",
"url": "https://bugzilla.suse.com/1134156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-mini-devel-9.27-lp150.2.23.1.x86_64",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.i586",
"openSUSE Leap 15.0:ghostscript-x11-9.27-lp150.2.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T14:22:56Z",
"details": "important"
}
],
"title": "CVE-2019-3839"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…