<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ghostscript</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3036-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-05T16:05:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-05T16:05:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-05T16:05:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ghostscript</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  
This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3036-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-9.25-14.9.1">
      <FullProductName ProductID="ghostscript-9.25-14.9.1">ghostscript-9.25-14.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-devel-9.25-14.9.1">
      <FullProductName ProductID="ghostscript-devel-9.25-14.9.1">ghostscript-devel-9.25-14.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-mini-9.25-14.9.1">
      <FullProductName ProductID="ghostscript-mini-9.25-14.9.1">ghostscript-mini-9.25-14.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-mini-devel-9.25-14.9.1">
      <FullProductName ProductID="ghostscript-mini-devel-9.25-14.9.1">ghostscript-mini-devel-9.25-14.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-x11-9.25-14.9.1">
      <FullProductName ProductID="ghostscript-x11-9.25-14.9.1">ghostscript-x11-9.25-14.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ghostscript-9.25-14.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ghostscript-9.25-14.9.1">ghostscript-9.25-14.9.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-devel-9.25-14.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1">ghostscript-devel-9.25-14.9.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-mini-9.25-14.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1">ghostscript-mini-9.25-14.9.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-mini-devel-9.25-14.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1">ghostscript-mini-devel-9.25-14.9.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-x11-9.25-14.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1">ghostscript-x11-9.25-14.9.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.</Note>
    </Notes>
    <CVE>CVE-2018-15908</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15908.html</URL>
        <Description>CVE-2018-15908</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106171</URL>
        <Description>SUSE Bug 1106171</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.</Note>
    </Notes>
    <CVE>CVE-2018-15909</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15909.html</URL>
        <Description>CVE-2018-15909</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106172</URL>
        <Description>SUSE Bug 1106172</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.</Note>
    </Notes>
    <CVE>CVE-2018-15910</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15910.html</URL>
        <Description>CVE-2018-15910</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106173</URL>
        <Description>SUSE Bug 1106173</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.</Note>
    </Notes>
    <CVE>CVE-2018-15911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15911.html</URL>
        <Description>CVE-2018-15911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105464</URL>
        <Description>SUSE Bug 1105464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106195</URL>
        <Description>SUSE Bug 1106195</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.</Note>
    </Notes>
    <CVE>CVE-2018-16509</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16509.html</URL>
        <Description>CVE-2018-16509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107410</URL>
        <Description>SUSE Bug 1107410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118318</URL>
        <Description>SUSE Bug 1118318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16510.html</URL>
        <Description>CVE-2018-16510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107411</URL>
        <Description>SUSE Bug 1107411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16511.html</URL>
        <Description>CVE-2018-16511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107426</URL>
        <Description>SUSE Bug 1107426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16513.html</URL>
        <Description>CVE-2018-16513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107412</URL>
        <Description>SUSE Bug 1107412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.</Note>
    </Notes>
    <CVE>CVE-2018-16539</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16539.html</URL>
        <Description>CVE-2018-16539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107422</URL>
        <Description>SUSE Bug 1107422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16540.html</URL>
        <Description>CVE-2018-16540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107420</URL>
        <Description>SUSE Bug 1107420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.</Note>
    </Notes>
    <CVE>CVE-2018-16541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16541.html</URL>
        <Description>CVE-2018-16541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107421</URL>
        <Description>SUSE Bug 1107421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.</Note>
    </Notes>
    <CVE>CVE-2018-16542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16542.html</URL>
        <Description>CVE-2018-16542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107413</URL>
        <Description>SUSE Bug 1107413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.</Note>
    </Notes>
    <CVE>CVE-2018-16543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16543.html</URL>
        <Description>CVE-2018-16543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107423</URL>
        <Description>SUSE Bug 1107423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193).</Note>
    </Notes>
    <CVE>CVE-2018-16585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16585.html</URL>
        <Description>CVE-2018-16585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107581</URL>
        <Description>SUSE Bug 1107581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.</Note>
    </Notes>
    <CVE>CVE-2018-16802</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16802.html</URL>
        <Description>CVE-2018-16802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107410</URL>
        <Description>SUSE Bug 1107410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117327</URL>
        <Description>SUSE Bug 1117327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.</Note>
    </Notes>
    <CVE>CVE-2018-17183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ghostscript-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-mini-devel-9.25-14.9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ghostscript-x11-9.25-14.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17183.html</URL>
        <Description>CVE-2018-17183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108027</URL>
        <Description>SUSE Bug 1108027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109105</URL>
        <Description>SUSE Bug 1109105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111479</URL>
        <Description>SUSE Bug 1111479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111480</URL>
        <Description>SUSE Bug 1111480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112229</URL>
        <Description>SUSE Bug 1112229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117022</URL>
        <Description>SUSE Bug 1117022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117331</URL>
        <Description>SUSE Bug 1117331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118455</URL>
        <Description>SUSE Bug 1118455</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
