<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ghostscript</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:3044-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-09-15T08:17:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-09-15T08:17:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-09-15T08:17:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ghostscript</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ghostscript fixes the following issues:

Security issue fixed:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)

Also a hardening fix was added:

- Link as position independent executable (bsc#1184123)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-SLE-15.3-2021-3044</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64NXCVRRUDYD4U65CYH2ROCOGMSYF3U/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:3044-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184123</URL>
      <Description>SUSE Bug 1184123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190381</URL>
      <Description>SUSE Bug 1190381</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3781/</URL>
      <Description>SUSE CVE CVE-2021-3781 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-9.52-155.1">
      <FullProductName ProductID="ghostscript-9.52-155.1">ghostscript-9.52-155.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-devel-9.52-155.1">
      <FullProductName ProductID="ghostscript-devel-9.52-155.1">ghostscript-devel-9.52-155.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ghostscript-x11-9.52-155.1">
      <FullProductName ProductID="ghostscript-x11-9.52-155.1">ghostscript-x11-9.52-155.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libspectre-devel-0.2.8-3.12.1">
      <FullProductName ProductID="libspectre-devel-0.2.8-3.12.1">libspectre-devel-0.2.8-3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libspectre1-0.2.8-3.12.1">
      <FullProductName ProductID="libspectre1-0.2.8-3.12.1">libspectre1-0.2.8-3.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ghostscript-9.52-155.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:ghostscript-9.52-155.1">ghostscript-9.52-155.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-devel-9.52-155.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:ghostscript-devel-9.52-155.1">ghostscript-devel-9.52-155.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ghostscript-x11-9.52-155.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:ghostscript-x11-9.52-155.1">ghostscript-x11-9.52-155.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libspectre-devel-0.2.8-3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libspectre-devel-0.2.8-3.12.1">libspectre-devel-0.2.8-3.12.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libspectre1-0.2.8-3.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libspectre1-0.2.8-3.12.1">libspectre1-0.2.8-3.12.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:ghostscript-9.52-155.1</ProductID>
        <ProductID>openSUSE Leap 15.3:ghostscript-devel-9.52-155.1</ProductID>
        <ProductID>openSUSE Leap 15.3:ghostscript-x11-9.52-155.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libspectre-devel-0.2.8-3.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libspectre1-0.2.8-3.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64NXCVRRUDYD4U65CYH2ROCOGMSYF3U/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3781.html</URL>
        <Description>CVE-2021-3781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190381</URL>
        <Description>SUSE Bug 1190381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191712</URL>
        <Description>SUSE Bug 1191712</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
