Bug 49331

Summary: ghostscript: Multiple issues (4.4)
Product: UCS Reporter: Quality Assurance <qa>
Component: Security updatesAssignee: Quality Assurance <qa>
Status: CLOSED FIXED QA Contact: Philipp Hahn <hahn>
Severity: normal    
Priority: P3    
Version: UCS 4.4   
Target Milestone: UCS 4.4-0-errata   
Hardware: All   
OS: Linux   
What kind of report is it?: Security Issue What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score: 7.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Description Quality Assurance univentionstaff 2019-04-23 10:40:28 CEST
New Debian ghostscript 9.26a~dfsg-0+deb9u2 fixes:
This update addresses the following issues:
* superexec operator is available (700585) (CVE-2019-3835)
* forceput in DefineResource is still accessible (700576) (CVE-2019-3838)
Comment 1 Quality Assurance univentionstaff 2019-04-23 11:01:05 CEST
--- mirror/ftp/4.4/unmaintained/4.4-0/source/ghostscript_9.26a~dfsg-0+deb9u1.dsc
+++ apt/ucs_4.4-0-errata4.4-0/source/ghostscript_9.26a~dfsg-0+deb9u2.dsc
@@ -1,3 +1,17 @@
+9.26a~dfsg-0+deb9u2 [Sat, 13 Apr 2019 16:40:43 +0200] Salvatore Bonaccorso <carnil@debian.org>:
+
+  * Non-maintainer upload by the Security Team.
+  * Have gs_cet.ps run from gs_init.ps
+  * Undef /odef in gs_init.ps
+  * Restrict superexec and remove it from internals and gs_cet.ps
+    (CVE-2019-3835) (Closes: #925256)
+  * Obliterate "superexec". We don't need it, nor do any known apps
+    (CVE-2019-3835) (Closes: #925256)
+  * Make a transient proc executeonly (in DefineResource) (CVE-2019-3838)
+    (Closes: #925257)
+  * an extra transient proc needs executeonly'ed (CVE-2019-3838)
+    (Closes: #925257)
+
 9.26a~dfsg-0+deb9u1 [Thu, 24 Jan 2019 22:49:29 +0100] Salvatore Bonaccorso <carnil@debian.org>:
 
   * Non-maintainer upload by the Security Team.

<http://10.200.17.11/4.4-0/#3440152646178729458>
Comment 2 Philipp Hahn univentionstaff 2019-04-23 12:37:59 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-0] 7ab05c7b75 Bug #49331: ghostscript 9.26a~dfsg-0+deb9u2
 doc/errata/staging/ghostscript.yaml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

[4.4-0] 1f0e2ab1bc Bug #49331: ghostscript 9.26a~dfsg-0+deb9u2
 doc/errata/staging/ghostscript.yaml | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
Comment 3 Arvid Requate univentionstaff 2019-04-24 13:13:06 CEST
<http://errata.software-univention.de/ucs/4.4/52.html>