Thanks for filing the upstream bug, I am making this bug public since
the commits are public and the issue is fixed in later releases. Thanks!

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ghostscript in Ubuntu.
https://bugs.launchpad.net/bugs/1969932

Title:
  Security issue in Ghostscript 9.26 due to missing patch

Status in ghostscript package in Ubuntu:
  New

Bug description:
  I'm a German security researcher and submitted a report via HackerOne
  to Yahoo, they encouraged me to notify you directly regarding this
  issue. As it turned out, older Ubuntu LTS versions are affected:

  - ghostscript_9.26~dfsg+0-0ubuntu0.18.04.15 (Bionic Beaver)
  - ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14 (Xenial Xerus)
  - ghostscript_9.26~dfsg+0-0ubuntu0.14.04.8 (Trusty Tahr)

  The issue is caused by a missing patch from 2019 [1], a variant of
  CVE-2019-6116, which can lead to a -dSAFER bypass (i.e., a malicious
  PostScript/EPS file can potentially execute arbitrary shell commands).
  Jammy Jellyfish, Impish Indri, and Focal Fossa are *not* affected.

  *Countermeasures:* Make sure to apply this patch [1] to the older LTS
  versions (14/16/18).

  [1] https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=430e2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/1969932/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to