ArchLinux: 201911-5: ghostscript: sandbox escape
Summary
- CVE-2019-14811 (sandbox escape)
Safer Mode Bypass by .forceput Exposure in .pdf_hook_DSC_Creator.
- CVE-2019-14812 (sandbox escape)
Safer Mode Bypass by .forceput Exposure in setuserparams
- CVE-2019-14813 (sandbox escape)
Safer Mode Bypass by .forceput Exposure in setsystemparams
- CVE-2019-14817 (sandbox escape)
Safer Mode Bypass by .forceput Exposure in .pdfexectoken and other
procedures.
Resolution
Upgrade to 9.50-1.
# pacman -Syu "ghostscript>=9.50-1"
The problems have been fixed upstream in version 9.50.
References
https://marc.info/?l=oss-security&m=156699539604858 https://git.ghostscript.com/;a=commitdiff;h=885444fcbe10dc42787ecb76686c8ee4dd33bf33 https://git.ghostscript.com/;a=commitdiff;h=cd1b1cacadac2479e291efe611979bdc1b3bdb19 https://security.archlinux.org/CVE-2019-14811 https://security.archlinux.org/CVE-2019-14812 https://security.archlinux.org/CVE-2019-14813 https://security.archlinux.org/CVE-2019-14817
Workaround
None.