Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in ghostscript
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in ghostscript
ID: FEDORA-2019-17f42f585a
Distribution: Fedora
Plattformen: Fedora 30
Datum: Mo, 18. November 2019, 07:38
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869
Applikationen: AFPL Ghostscript

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-17f42f585a
2019-11-18 01:17:12.296718
-------------------------------------------------------------------------------
-

Name : ghostscript
Product : Fedora 30
Version : 9.27
Release : 2.fc30
URL : https://ghostscript.com/
Summary : Interpreter for PostScript language & PDF
Description :
This package provides useful conversion utilities based on Ghostscript
software,
for converting PS, PDF and other document formats between each other.

Ghostscript is a suite of software providing an interpreter for Adobe
Systems'
PostScript (PS) and Portable Document Format (PDF) page description languages.
Its primary purpose includes displaying (rasterization & rendering) and
printing
of document pages, as well as conversions between different document formats.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2019-14869
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Nov 14 2019 Zdenek Dohnal <zdohnal@redhat.com> - 9.27-2
- 1772486 - ghostscript: -dSAFER escape in .charkeys (701841)
* Fri Sep 6 2019 Martin Osvald <mosvald@redhat.com> - 9.27-1
- rebase to latest upstream version 9.27
- security fixes added for:
- CVE-2019-14811 (bug #1747908)
- CVE-2019-14812 (bug #1747907)
- CVE-2019-14813 (bug #1747906)
- CVE-2019-14817 (bug #1747909)
* Mon Aug 12 2019 Martin Osvald <mosvald@redhat.com> - 9.26-6
- Fix for CVE-2019-10216 added
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> -
9.26-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
- Fix for CVE-2019-10216 added
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1768911 - CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys
(701841)
https://bugzilla.redhat.com/show_bug.cgi?id=1768911
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-17f42f585a' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung