ghostscript (SL6)

Synopsis: Moderate: ghostscript security update
Advisory ID: SLSA-2017:0014-1
Issue Date: 2017-01-04
CVE Numbers: CVE-2013-5653
CVE-2016-7977
CVE-2016-7979
CVE-2016-8602

Security Fix(es):

* It was found that the ghostscript functions getenv, filenameforall and
.libfile did not honor the -dSAFER option, usually used when processing
untrusted documents, leading to information disclosure. A specially
crafted postscript document could read environment variable, list
directory and retrieve file content respectively, from the target.
(CVE-2013-5653, CVE-2016-7977)

* It was found that the ghostscript function .initialize_dsc_parser did
not validate its parameter before using it, allowing a type confusion
flaw. A specially crafted postscript document could cause a crash code
execution in the context of the gs process. (CVE-2016-7979)

* It was found that ghostscript did not sufficiently check the validity of
parameters given to the .sethalftone5 function. A specially crafted
postscript document could cause a crash, or execute arbitrary code in the
context of the gs process. (CVE-2016-8602)

SL6
x86_64
ghostscript-8.70-21.el6_8.1.i686.rpm
ghostscript-8.70-21.el6_8.1.x86_64.rpm
ghostscript-debuginfo-8.70-21.el6_8.1.i686.rpm
ghostscript-debuginfo-8.70-21.el6_8.1.x86_64.rpm
ghostscript-devel-8.70-21.el6_8.1.i686.rpm
ghostscript-devel-8.70-21.el6_8.1.x86_64.rpm
ghostscript-doc-8.70-21.el6_8.1.x86_64.rpm
ghostscript-gtk-8.70-21.el6_8.1.x86_64.rpm
i386
ghostscript-8.70-21.el6_8.1.i686.rpm
ghostscript-debuginfo-8.70-21.el6_8.1.i686.rpm
ghostscript-devel-8.70-21.el6_8.1.i686.rpm
ghostscript-doc-8.70-21.el6_8.1.i686.rpm
ghostscript-gtk-8.70-21.el6_8.1.i686.rpm

– Scientific Linux Development Team