Bugzilla – Bug 1107581
VUL-0: CVE-2018-16585: ghostscript,ghostscript-library: .setdistillerkeys PostScript command is accepted even though it is not intended for use
Last modified: 2020-06-08 23:25:00 UTC
An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. https://seclists.org/oss-sec/2018/q3/182 http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22 http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be
SUSE-SU-2018:2975-1: An update that fixes 16 vulnerabilities is now available. Category: security (important) Bug References: 1106171,1106172,1106173,1106195,1107410,1107411,1107412,1107413,1107420,1107421,1107422,1107423,1107426,1107581,1108027,1109105 CVE References: CVE-2018-15908,CVE-2018-15909,CVE-2018-15910,CVE-2018-15911,CVE-2018-16509,CVE-2018-16510,CVE-2018-16511,CVE-2018-16513,CVE-2018-16539,CVE-2018-16540,CVE-2018-16541,CVE-2018-16542,CVE-2018-16543,CVE-2018-16585,CVE-2018-16802,CVE-2018-17183 Sources used: SUSE OpenStack Cloud 7 (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Server 12-SP3 (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Server 12-LTSS (src): ghostscript-9.25-23.13.1 SUSE Linux Enterprise Desktop 12-SP3 (src): ghostscript-9.25-23.13.1 SUSE Enterprise Storage 4 (src): ghostscript-9.25-23.13.1
SUSE-SU-2018:2976-1: An update that fixes 16 vulnerabilities is now available. Category: security (important) Bug References: 1106171,1106172,1106173,1106195,1107410,1107411,1107412,1107413,1107420,1107421,1107422,1107423,1107426,1107581,1108027,1109105 CVE References: CVE-2018-15908,CVE-2018-15909,CVE-2018-15910,CVE-2018-15911,CVE-2018-16509,CVE-2018-16510,CVE-2018-16511,CVE-2018-16513,CVE-2018-16539,CVE-2018-16540,CVE-2018-16541,CVE-2018-16542,CVE-2018-16543,CVE-2018-16585,CVE-2018-16802,CVE-2018-17183 Sources used: SUSE Linux Enterprise Module for Desktop Applications 15 (src): libspectre-0.2.8-3.2.1 SUSE Linux Enterprise Module for Basesystem 15 (src): ghostscript-9.25-3.6.1
openSUSE-SU-2018:3036-1: An update that fixes 16 vulnerabilities is now available. Category: security (important) Bug References: 1106171,1106172,1106173,1106195,1107410,1107411,1107412,1107413,1107420,1107421,1107422,1107423,1107426,1107581,1108027,1109105 CVE References: CVE-2018-15908,CVE-2018-15909,CVE-2018-15910,CVE-2018-15911,CVE-2018-16509,CVE-2018-16510,CVE-2018-16511,CVE-2018-16513,CVE-2018-16539,CVE-2018-16540,CVE-2018-16541,CVE-2018-16542,CVE-2018-16543,CVE-2018-16585,CVE-2018-16802,CVE-2018-17183 Sources used: openSUSE Leap 42.3 (src): ghostscript-9.25-14.9.1, ghostscript-mini-9.25-14.9.1
openSUSE-SU-2018:3038-1: An update that fixes 16 vulnerabilities is now available. Category: security (important) Bug References: 1106171,1106172,1106173,1106195,1107410,1107411,1107412,1107413,1107420,1107421,1107422,1107423,1107426,1107581,1108027,1109105 CVE References: CVE-2018-15908,CVE-2018-15909,CVE-2018-15910,CVE-2018-15911,CVE-2018-16509,CVE-2018-16510,CVE-2018-16511,CVE-2018-16513,CVE-2018-16539,CVE-2018-16540,CVE-2018-16541,CVE-2018-16542,CVE-2018-16543,CVE-2018-16585,CVE-2018-16802,CVE-2018-17183 Sources used: openSUSE Leap 15.0 (src): ghostscript-9.25-lp150.2.6.1, ghostscript-mini-9.25-lp150.2.6.1, libspectre-0.2.8-lp150.2.3.1
SUSE-SU-2018:2975-2: An update that fixes 16 vulnerabilities is now available. Category: security (important) Bug References: 1106171,1106172,1106173,1106195,1107410,1107411,1107412,1107413,1107420,1107421,1107422,1107423,1107426,1107581,1108027,1109105 CVE References: CVE-2018-15908,CVE-2018-15909,CVE-2018-15910,CVE-2018-15911,CVE-2018-16509,CVE-2018-16510,CVE-2018-16511,CVE-2018-16513,CVE-2018-16539,CVE-2018-16540,CVE-2018-16541,CVE-2018-16542,CVE-2018-16543,CVE-2018-16585,CVE-2018-16802,CVE-2018-17183 Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): ghostscript-9.25-23.13.1
SUSE-SU-2018:2975-3: An update that fixes 16 vulnerabilities is now available. Category: security (important) Bug References: 1106171,1106172,1106173,1106195,1107410,1107411,1107412,1107413,1107420,1107421,1107422,1107423,1107426,1107581,1108027,1109105 CVE References: CVE-2018-15908,CVE-2018-15909,CVE-2018-15910,CVE-2018-15911,CVE-2018-16509,CVE-2018-16510,CVE-2018-16511,CVE-2018-16513,CVE-2018-16539,CVE-2018-16540,CVE-2018-16541,CVE-2018-16542,CVE-2018-16543,CVE-2018-16585,CVE-2018-16802,CVE-2018-17183 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): ghostscript-9.25-23.13.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
released