Fedora alert FEDORA-2019-077a3f23c0 (ghostscript)
| From: | updates@fedoraproject.org | |
| To: | package-announce@lists.fedoraproject.org | |
| Subject: | [SECURITY] Fedora 29 Update: ghostscript-9.26-1.fc29 | |
| Date: | Tue, 12 Feb 2019 02:58:39 +0000 (UTC) | |
| Message-ID: | <20190212025839.3B20860F60C5@bastion01.phx2.fedoraproject.org> |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2019-077a3f23c0 2019-02-12 02:55:09.916691 -------------------------------------------------------------------------------- Name : ghostscript Product : Fedora 29 Version : 9.26 Release : 1.fc29 URL : https://ghostscript.com/ Summary : Interpreter for PostScript language & PDF Description : This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats. -------------------------------------------------------------------------------- Update Information: - rebase to latest upstream version 9.26 - Security fix for CVE-2018-19478 CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409 CVE-2018-18284 CVE-2018-18073 CVE-2018-17961 -------------------------------------------------------------------------------- ChangeLog: * Thu Feb 7 2019 Martin Osvald <mosvald@redhat.com> - 9.26-1 - rebase to latest upstream version 9.26 - spec change to remove gsdoc.el due to upstream 8bc783cb586 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1656319 - CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1656319 [ 2 ] Bug #1656320 - CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1656320 [ 3 ] Bug #1658244 - [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV https://bugzilla.redhat.com/show_bug.cgi?id=1658244 [ 4 ] Bug #1654470 - CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1654470 [ 5 ] Bug #1654465 - CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1654465 [ 6 ] Bug #1654460 - CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1654460 [ 7 ] Bug #1652584 - CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1652584 [ 8 ] Bug #1642943 - CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1642943 [ 9 ] Bug #1642585 - CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1642585 [ 10 ] Bug #1642579 - CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1642579 [ 11 ] Bug #1663896 - GS fails to process many EPS files - Error: /nocurrentpoint in --currentpoint-- https://bugzilla.redhat.com/show_bug.cgi?id=1663896 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-077a3f23c0' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann...
