You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa ghostscript

Sigurnosni nedostaci programskog paketa ghostscript

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-82acb29c1b
2019-02-18 01:25:49.106911
——————————————————————————–

Name : ghostscript
Product : Fedora 28
Version : 9.26
Release : 1.fc28
URL : https://ghostscript.com/
Summary : Interpreter for PostScript language & PDF
Description :
This package provides useful conversion utilities based on Ghostscript software,
for converting PS, PDF and other document formats between each other.

Ghostscript is a suite of software providing an interpreter for Adobe Systems’
PostScript (PS) and Portable Document Format (PDF) page description languages.
Its primary purpose includes displaying (rasterization & rendering) and printing
of document pages, as well as conversions between different document formats.

——————————————————————————–
Update Information:

– rebase to latest upstream version 9.26 – Security fix for CVE-2018-19478
CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409
CVE-2018-18284 CVE-2018-18073 CVE-2018-17961
——————————————————————————–
ChangeLog:

* Thu Feb 7 2019 Martin Osvald <mosvald@redhat.com> – 9.26-1
– rebase to latest upstream version 9.26
– spec change to remove gsdoc.el due to upstream 8bc783cb586
* Mon Sep 17 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.25-1
– rebase to latest upstream version to fix additional issues found in 9.24
* Fri Sep 14 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.24-3
– ghostscript-9.24-002-icc-PermitReading.patch removed
– ghostscript-9.24-002-fix-for-Canon-and-Kyocera-printers.patch added (bug #1626818)
– ghostscript-9.24-003-CVE-2018-16802.patch added (bug #1627960)
* Fri Sep 7 2018 Tom Callaway <spot@fedoraproject.org> – 9.24-2
– add upstream fix for reading in ICC profiles
* Wed Sep 5 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.24-1
– rebase to latest upstream version, which contains important CVE fixes
– additional ZER0-DAY fixes added
* Wed Aug 29 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.23-7
– ghostscript-9.23-002-fixes-for-set-of-CVEs-reported-by-Google.patch added
* Mon Jul 30 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.23-6
– ghostscript-9.23-001-create-GC-descriptors-for-JPEG-passthrough.patch added (bug #1589467)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> – 9.23-5
– Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Tue May 15 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.23-4
– One more rebuild for libidn ABI fix (BZ#’s 1573961 and 1566414)
* Mon May 14 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.23-3
– %conflicts_vers bumped to fix F27->F28 upgrade
* Thu May 10 2018 Stephen Gallagher <sgallagh@redhat.com> – 9.23-2.1
– Rebuilding for libidn ABI fix (BZ#’s 1573961 and 1566414)
* Mon Apr 23 2018 David Kaspar [Dee’Kej] <dkaspar@redhat.com> – 9.23-2
– Fix for CVE-2018-10194 added (bug #1569821)
——————————————————————————–
References:

[ 1 ] Bug #1656319 – CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1656319
[ 2 ] Bug #1656320 – CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1656320
[ 3 ] Bug #1658244 – [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV
https://bugzilla.redhat.com/show_bug.cgi?id=1658244
[ 4 ] Bug #1654470 – CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1654470
[ 5 ] Bug #1654465 – CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1654465
[ 6 ] Bug #1654460 – CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1654460
[ 7 ] Bug #1652584 – CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1652584
[ 8 ] Bug #1642943 – CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1642943
[ 9 ] Bug #1642585 – CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1642585
[ 10 ] Bug #1642579 – CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1642579
[ 11 ] Bug #1663896 – GS fails to process many EPS files – Error: /nocurrentpoint in –currentpoint–
https://bugzilla.redhat.com/show_bug.cgi?id=1663896
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-82acb29c1b’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-02-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa kf5-kauth

Otkriven je sigurnosni nedostatak u programskom paketu kf5-kauth za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanj DoS stanja...

Close