In Ghostscript 9.27, some ephemeral routines in setsystemparams can expose .forceput operator when hooking errors. This issue is similar to upstream bug https://bugs.ghostscript.com/show_bug.cgi?id=700317. http://git.ghostscript.com/?p=ghostpdl.git;a=blob;f=Resource/Init/gs_lev2.ps;h=98d55fe74251e2b8f384a0a97d0a92a9f88949b6;hb=ebfaa2db4cb518a2bc99c1532d4429201a13dfab#l227 227 //pssystemparams 3 1 roll .forceput % pssystemparams is read-only 228 } executeonly 229 { pop pop 230 } 231 ifelse 232 } 233 forall pop Reference: https://bugs.ghostscript.com/show_bug.cgi?id=701443
Upstream fix : http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=885444fcbe10dc42787ecb76686c8ee4dd33bf33
Mitigation: Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509
Acknowledgments: Name: Artifex Software Upstream: Hiroki MATSUKUMA (Cyber Defense Institute)
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2586 https://access.redhat.com/errata/RHSA-2019:2586
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:2591 https://access.redhat.com/errata/RHSA-2019:2591
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1747906]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-14813