Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ghostscript
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ghostscript
ID: FEDORA-2019-077a3f23c0
Distribution: Fedora
Plattformen: Fedora 29
Datum: Di, 12. Februar 2019, 07:28
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183
https://bugzilla.redhat.com/show_bug.cgi?id=1658244
https://bugzilla.redhat.com/show_bug.cgi?id=1663896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478
Applikationen: AFPL Ghostscript

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-077a3f23c0
2019-02-12 02:55:09.916691
-------------------------------------------------------------------------------
-

Name : ghostscript
Product : Fedora 29
Version : 9.26
Release : 1.fc29
URL : https://ghostscript.com/
Summary : Interpreter for PostScript language & PDF
Description :
This package provides useful conversion utilities based on Ghostscript
software,
for converting PS, PDF and other document formats between each other.

Ghostscript is a suite of software providing an interpreter for Adobe
Systems'
PostScript (PS) and Portable Document Format (PDF) page description languages.
Its primary purpose includes displaying (rasterization & rendering) and
printing
of document pages, as well as conversions between different document formats.

-------------------------------------------------------------------------------
-
Update Information:

- rebase to latest upstream version 9.26 - Security fix for CVE-2018-19478
CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409
CVE-2018-18284 CVE-2018-18073 CVE-2018-17961
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Feb 7 2019 Martin Osvald <mosvald@redhat.com> - 9.26-1
- rebase to latest upstream version 9.26
- spec change to remove gsdoc.el due to upstream 8bc783cb586
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1656319 - CVE-2018-19478 ghostscript: Attempting to open a
carefully crafted PDF file results in long-running computation (699856) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1656319
[ 2 ] Bug #1656320 - CVE-2018-19134 ghostscript: Type confusion in setpattern
(700141) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1656320
[ 3 ] Bug #1658244 - [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV
https://bugzilla.redhat.com/show_bug.cgi?id=1658244
[ 4 ] Bug #1654470 - CVE-2018-19477 ghostscript: access bypass in
psi/zfjbig2.c (700168) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1654470
[ 5 ] Bug #1654465 - CVE-2018-19476 ghostscript: access bypass in psi/zicc.c
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1654465
[ 6 ] Bug #1654460 - CVE-2018-19475 ghostscript: access bypass in
psi/zdevice2.c (700153) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1654460
[ 7 ] Bug #1652584 - CVE-2018-19409 ghostscript: Improperly implemented
security check in zsetdevice function in psi/zdevice.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1652584
[ 8 ] Bug #1642943 - CVE-2018-18284 ghostscript: 1Policy operator allows a
sandbox protection bypass [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1642943
[ 9 ] Bug #1642585 - CVE-2018-18073 ghostscript: Saved execution stacks can
leak operator arrays [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1642585
[ 10 ] Bug #1642579 - CVE-2018-17961 ghostscript: saved execution stacks can
leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1642579
[ 11 ] Bug #1663896 - GS fails to process many EPS files - Error:
/nocurrentpoint in --currentpoint--
https://bugzilla.redhat.com/show_bug.cgi?id=1663896
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-077a3f23c0' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung