• [gentoo-announce] [ GLSA 202309-03 ] GPL Ghostscript: Multiple Vulnerab

    From glsamaker@gentoo.org@21:1/5 to All on Sun Sep 17 07:40:02 2023
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202309-03
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: GPL Ghostscript: Multiple Vulnerabilities
    Date: September 17, 2023
    Bugs: #904245, #910294
    ID: 202309-03

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in GPL Ghostscript, the
    worst of which could result in remote code execution.

    Background
    ==========

    Ghostscript is an interpreter for the PostScript language and for PDF.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------------------ ------------ ------------
    app-text/ghostscript-gpl < 10.01.2 >= 10.01.2

    Description
    ===========

    Multiple vulnerabilities have been discovered in GPL Ghostscript. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All GPL Ghostscript users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-10.01.2"

    References
    ==========

    [ 1 ] CVE-2022-2085
    https://nvd.nist.gov/vuln/detail/CVE-2022-2085
    [ 2 ] CVE-2023-28879
    https://nvd.nist.gov/vuln/detail/CVE-2023-28879
    [ 3 ] CVE-2023-36664
    https://nvd.nist.gov/vuln/detail/CVE-2023-36664

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202309-03

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2023 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmUGjhYACgkQFMQkOaVy +9ljcBAAnRteDZswgNFmpWN4Ntn3g9aeZ1JwzRzwP1cs4A61GU9ehoWEGCK6PED0 eNrR6mAdZFVLQZdF7gPaEhY6uAp+ApGRVIvtHScpQ9bUZ4xN8ZtdIvEAssYdJ7MH ezbDCkOzyWT3ZV1/lMiWc5czhw7Gi5Oyp+qO3YSfYQ+sN5OkyjbVni+V5ULKqnHv fWTjQV8Gfy0t7HX1C9BhUDrlEL6E83Ua93S1AHxSpai+EFEtNJdZkS2FghR4Dgaa O8U27xDYGhF/vqJ3KhrpX+fzVFHbDG8LZI/xASHTIRyUpMJsmiHW6omAAa+FFfnj aMh8TQTGTy0WVPvtSQ1iBH/WQniWSQxsNmhfMmm2xMIBvSKb0UvZ/dlLgUcLl1/8 ppHCsnglvr4NhCx4DraO3S3asIQqxN2q9X9y3+XdQ1QXYUsWA+bz3mrevDvQi15i JCCeAKYUgY4jhEgCLzVRwLMLMLSQu88JyKzRFHp4w0x3fsepcqVOjeNjX9bmxZoG 5MhzvvuaxLA3CbMM2+iHhZpjJlQ0ZVAA1Cl/R12LKoCUHHZrEhN1d6sppzfDTdCP +dok/8s/qT8QbQKtfamYZVxNH4dZdLxVnHKNFbe1a52G3ou2QRn3bFCJ3hjLb+mW SpFCaQjy3qv38bZwJCFZsyq4DTQrU5BeyCF9deqClvYpPmoWckI=
    =9iu3
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)