You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa ghostscript

Sigurnosni nedostaci programskog paketa ghostscript

——————————————————————————–
Fedora Update Notification
FEDORA-2017-c85c0e5637
2017-05-06 17:08:31.477958
——————————————————————————–

Name : ghostscript
Product : Fedora 25
Version : 9.20
Release : 9.fc25
URL : http://www.ghostscript.com/
Summary : A PostScript interpreter and renderer
Description :
Ghostscript is a set of software that provides a PostScript
interpreter, a set of C procedures (the Ghostscript library, which
implements the graphics capabilities in the PostScript language) and
an interpreter for Portable Document Format (PDF) files. Ghostscript
translates PostScript code into many common, bitmapped formats, like
those understood by your printer or screen. Ghostscript is normally
used to display PostScript files and to print PostScript files to
non-PostScript printers.

If you need to display PostScript files or print them to
non-PostScript printers, you should install ghostscript. If you
install ghostscript, you also need to install the ghostscript-fonts
package.

——————————————————————————–
Update Information:

Security fixes release for these CVEs: *
[CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use-
after-free and application crash)* *
[CVE-2016-10218](https://access.redhat.com/security/cve/CVE-2016-10218) *(NULL
pointer dereference and application crash)* *
[CVE-2016-10219](https://access.redhat.com/security/cve/CVE-2016-10219)
*(divide-by-zero error and application crash)* *
[CVE-2016-10220](https://access.redhat.com/security/cve/CVE-2016-10220) *(NULL
pointer dereference and application crash)* *
[CVE-2017-5951](https://access.redhat.com/security/cve/CVE-2017-5951) *(NULL
pointer dereference and application crash)* *
[CVE-2017-7975](https://access.redhat.com/security/cve/CVE-2017-7975)
*(application crash or possible execution of arbitrary code)* *
[CVE-2017-8291](https://access.redhat.com/security/cve/CVE-2017-8291) *( -dSAFER
bypass and remote command execution)*
——————————————————————————–
References:

[ 1 ] Bug #1441581 – CVE-2016-10217 CVE-2016-10218 CVE-2016-10219 CVE-2016-10220 CVE-2016-10317 CVE-2017-5951 ghostscript: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1441581
[ 2 ] Bug #1443934 – CVE-2017-7885 CVE-2017-7975 CVE-2017-7976 ghostscript: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1443934
[ 3 ] Bug #1446064 – CVE-2017-8291 ghostscript: -dSAFER bypass and command execution via a “/OutputFile (%pipe%” substring [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1446064
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade ghostscript’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa Chromium

Otkriven je sigurnosni nedostatak u programskom paketu Chromium za operacijski sustav openSUSE. Otkriveni nedostatak posljedica je promjene međurezultata operacije radi...

Close