Ghostscript is vulnerable to safer restriction bypass. The attack is possible due to a flaw of exposing .forceput
through .pdf_hook_DSC_Creator
when hooking errors, allowing an attacker to bypass the -dSAFER
restrictions by sending a malicious PostScript file.
git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=885444fcbe10dc42787ecb76686c8ee4dd33bf33
lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
access.redhat.com/errata/RHBA-2019:2824
access.redhat.com/errata/RHSA-2019:2586
access.redhat.com/errata/RHSA-2019:2594
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811
lists.debian.org/debian-lts-announce/2019/09/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
lists.fedoraproject.org/archives/list/[email protected]/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
lists.fedoraproject.org/archives/list/[email protected]/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
seclists.org/bugtraq/2019/Sep/15
security.gentoo.org/glsa/202004-03
www.debian.org/security/2019/dsa-4518