{"affected":[{"ecosystem_specific":{"binaries":[{"ghostscript":"9.26-3.9.4","ghostscript-devel":"9.26-3.9.4","ghostscript-x11":"9.26-3.9.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"ghostscript","purl":"pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.26-3.9.4"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libspectre-devel":"0.2.8-3.4.3","libspectre1":"0.2.8-3.4.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Desktop Applications 15","name":"libspectre","purl":"pkg:rpm/suse/libspectre&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.2.8-3.4.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ghostscript to version 9.26 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)\n- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)\n- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)\n- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)\n- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)\n- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)\n- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)\n- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)\n\nVersion update to 9.26 (bsc#1117331):\n\n- Security issues have been the primary focus\n- Minor bug fixes and improvements\n- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm\n","id":"SUSE-SU-2018:4087-1","modified":"2018-12-12T12:37:52Z","published":"2018-12-12T12:37:52Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20184087-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-17183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-17961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19475"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19477"}],"related":["CVE-2018-17183","CVE-2018-17961","CVE-2018-18073","CVE-2018-18284","CVE-2018-19409","CVE-2018-19475","CVE-2018-19476","CVE-2018-19477"],"summary":"Security update for ghostscript","upstream":["CVE-2018-17183","CVE-2018-17961","CVE-2018-18073","CVE-2018-18284","CVE-2018-19409","CVE-2018-19475","CVE-2018-19476","CVE-2018-19477"]}