Debian Security Advisory

DLA-1620-1 ghostscript -- LTS security update

Date Reported:
27 Dec 2018
Affected Packages:
ghostscript
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2018-19134, CVE-2018-19478.
More information:

Some vulnerabilities were discovered in ghostscript, an interpreter for the PostScript language and for PDF.

  • CVE-2018-19134

    The setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.

  • CVE-2018-19478

    Attempting to open a carefully crafted PDF file results in long-running computation. A sufficiently bad page tree can lead to us taking significant amounts of time when checking the tree for recursion.

For Debian 8 Jessie, these problems have been fixed in version 9.06~dfsg-2+deb8u13.

We recommend that you upgrade your ghostscript packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS