{"affected":[{"ecosystem_specific":{"binaries":[{"ghostscript":"9.26-23.16.1","ghostscript-x11":"9.26-23.16.1","libspectre1":"0.2.7-12.4.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"ghostscript","purl":"pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.26-23.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ghostscript":"9.26-23.16.1","ghostscript-x11":"9.26-23.16.1","libspectre1":"0.2.7-12.4.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"libspectre","purl":"pkg:rpm/suse/libspectre&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.2.7-12.4.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ghostscript to version 9.26 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)\n- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)\n- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)\n- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)\n- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)\n- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)\n- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)\n- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)\n\nVersion update to 9.26 (bsc#1117331):\n\n- Security issues have been the primary focus\n- Minor bug fixes and improvements\n- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm\n","id":"SUSE-SU-2018:4090-2","modified":"2019-04-27T15:39:06Z","published":"2019-04-27T15:39:06Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20184090-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1109105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1111480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1117331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-17183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-17961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-18284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19475"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19477"}],"related":["CVE-2018-17183","CVE-2018-17961","CVE-2018-18073","CVE-2018-18284","CVE-2018-19409","CVE-2018-19475","CVE-2018-19476","CVE-2018-19477"],"summary":"Security update for ghostscript","upstream":["CVE-2018-17183","CVE-2018-17961","CVE-2018-18073","CVE-2018-18284","CVE-2018-19409","CVE-2018-19475","CVE-2018-19476","CVE-2018-19477"]}