Home / mailings [USN-2483-2] Ghostscript vulnerabilities
Posted on 26 January 2015
Ubuntu Security==========================
==========================
========================
Ubuntu Security Notice USN-2483-2
January 26, 2015
ghostscript vulnerabilities
==========================
==========================
========================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Ghostscript could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
- ghostscript: PostScript and PDF interpreter
Details:
USN-2483-1 fixed vulnerabilities in JasPer. This update provides the
corresponding fix for the JasPer library embedded in the Ghostscript
package.
Original advisory details:
Jose Duart discovered that JasPer incorrectly handled ICC color profiles=
in
JPEG-2000 image files. If a user were tricked into opening a specially
crafted JPEG-2000 image file, a remote attacker could cause JasPer to cr=
ash
or possibly execute arbitrary code with user privileges. (CVE-2014-8137)=
Jose Duart discovered that JasPer incorrectly decoded certain malformed=
JPEG-2000 image files. If a user were tricked into opening a specially
crafted JPEG-2000 image file, a remote attacker could cause JasPer to cr=
ash
or possibly execute arbitrary code with user privileges. (CVE-2014-8138)=
It was discovered that JasPer incorrectly handled certain malformed
JPEG-2000 image files. If a user were tricked into opening a specially
crafted JPEG-2000 image file, a remote attacker could cause JasPer to cr=
ash
or possibly execute arbitrary code with user privileges. (CVE-2014-8157)=
It was discovered that JasPer incorrectly handled memory when processin=
g
JPEG-2000 image files. If a user were tricked into opening a specially
crafted JPEG-2000 image file, a remote attacker could cause JasPer to cr=
ash
or possibly execute arbitrary code with user privileges. (CVE-2014-8158)=
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
libgs8 8.71.dfsg.1-0ubuntu5.7
In general, a standard system update will make all the necessary changes.=
References:
http://www.ubuntu.com/usn/usn-2483-2
http://www.ubuntu.com/usn/usn-2483-1
CVE-2014-8137, CVE-2014-8138, CVE-2014-8157, CVE-2014-8158
Package Information:
https://launchpad.net/ubuntu/+source/ghostscript/8.71.dfsg.1-0ubuntu5.7=