|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2017-fae1506f94 (ghostscript)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 24 Update: ghostscript-9.20-9.fc24
Date:  Mon, 15 May 2017 04:28:05 +0000 (UTC)
Message-ID:  <20170515042805.AE12E603250E@bastion01.phx2.fedoraproject.org>

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2017-fae1506f94 2017-05-14 20:15:03.387455 -------------------------------------------------------------------------------- Name : ghostscript Product : Fedora 24 Version : 9.20 Release : 9.fc24 URL : http://www.ghostscript.com/ Summary : A PostScript interpreter and renderer Description : Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Ghostscript translates PostScript code into many common, bitmapped formats, like those understood by your printer or screen. Ghostscript is normally used to display PostScript files and to print PostScript files to non-PostScript printers. If you need to display PostScript files or print them to non-PostScript printers, you should install ghostscript. If you install ghostscript, you also need to install the ghostscript-fonts package. -------------------------------------------------------------------------------- Update Information: Security fixes release for these CVEs: * [CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use- after-free and application crash)* * [CVE-2016-10218](https://access.redhat.com/security/cve/CVE-2016-10218) *(NULL pointer dereference and application crash)* * [CVE-2016-10219](https://access.redhat.com/security/cve/CVE-2016-10219) *(divide-by-zero error and application crash)* * [CVE-2016-10220](https://access.redhat.com/security/cve/CVE-2016-10220) *(NULL pointer dereference and application crash)* * [CVE-2017-5951](https://access.redhat.com/security/cve/CVE-2017-5951) *(NULL pointer dereference and application crash)* * [CVE-2017-7975](https://access.redhat.com/security/cve/CVE-2017-7975) *(application crash or possible execution of arbitrary code)* * [CVE-2017-8291](https://access.redhat.com/security/cve/CVE-2017-8291) *( -dSAFER bypass and remote command execution)* -------------------------------------------------------------------------------- References: [ 1 ] Bug #1441581 - CVE-2016-10217 CVE-2016-10218 CVE-2016-10219 CVE-2016-10220 CVE-2016-10317 CVE-2017-5951 ghostscript: various flaws [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1441581 [ 2 ] Bug #1443934 - CVE-2017-7885 CVE-2017-7975 CVE-2017-7976 ghostscript: various flaws [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1443934 [ 3 ] Bug #1446064 - CVE-2017-8291 ghostscript: -dSAFER bypass and command execution via a "/OutputFile (%pipe%" substring [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1446064 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade ghostscript' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds