安全公告详情

NS-SA-2019-0203

2019-10-14 19:29:28

简介

important: sox/ghostscript security update

严重级别

important

主题

An update for sox/ghostscript is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

sox: SoX (Sound eXchange) is a sound file format converter SoX can convert between many different digitized sound formats and perform simple sound manipulation functions, including sound effects.
ghostscript: This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats.


Security Fix(es):
sox: A NULL pointer dereference flaw found in the way SoX handled processing of AIFF files. An attacker could potentially use this flaw to crash the SoX application by tricking it into processing crafted AIFF files.(CVE-2017-18189)
sox: bugfix
ghostscript: Ghostscript did not honor the -dSAFER option when executing the "status" instruction, which can be used to retrieve information such as a file's existence and size. A specially crafted postscript document could use this flow to gain information on the targeted system's filesystem content.(CVE-2018-11645)
ghostscript: It was found that the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.(CVE-2019-10216)
ghostscript: A flaw was found in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.(CVE-2019-14813)
ghostscript: A flaw was found in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.(CVE-2019-14812)
ghostscript: A flaw was found in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.(CVE-2019-14811)
ghostscript: A flaw was found in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.(CVE-2019-14817)
ghostscript: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F18.

影响组件

  • sox
  • ghostscript

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["sox-14.4.1-7.el7.x86_64.rpm","sox-debuginfo-14.4.1-7.el7.x86_64.rpm","sox-devel-14.4.1-7.el7.x86_64.rpm"],"source":"sox-14.4.1-7.el7.src.rpm"},{"binary":["ghostscript-9.25-2.el7_7.2.x86_64.rpm","ghostscript-cups-9.25-2.el7_7.2.x86_64.rpm","ghostscript-debuginfo-9.25-2.el7_7.2.x86_64.rpm","ghostscript-doc-9.25-2.el7_7.2.noarch.rpm","ghostscript-gtk-9.25-2.el7_7.2.x86_64.rpm","libgs-9.25-2.el7_7.2.x86_64.rpm","libgs-devel-9.25-2.el7_7.2.x86_64.rpm"],"source":"ghostscript-9.25-2.el7_7.2.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["sox-14.4.1-7.el7.x86_64.rpm","sox-debuginfo-14.4.1-7.el7.x86_64.rpm","sox-devel-14.4.1-7.el7.x86_64.rpm"],"source":"sox-14.4.1-7.el7.src.rpm"},{"binary":["libgs-9.25-2.el7_7.2.x86_64.rpm","libgs-devel-9.25-2.el7_7.2.x86_64.rpm","ghostscript-9.25-2.el7_7.2.x86_64.rpm","ghostscript-cups-9.25-2.el7_7.2.x86_64.rpm","ghostscript-debuginfo-9.25-2.el7_7.2.x86_64.rpm","ghostscript-doc-9.25-2.el7_7.2.noarch.rpm","ghostscript-gtk-9.25-2.el7_7.2.x86_64.rpm"],"source":"ghostscript-9.25-2.el7_7.2.src.rpm"}]}]}

CVE

参考