——————————————————————————–
Fedora Update Notification
FEDORA-2017-fae1506f94
2017-05-14 20:15:03.387455
——————————————————————————–
Name : ghostscript
Product : Fedora 24
Version : 9.20
Release : 9.fc24
URL : http://www.ghostscript.com/
Summary : A PostScript interpreter and renderer
Description :
Ghostscript is a set of software that provides a PostScript
interpreter, a set of C procedures (the Ghostscript library, which
implements the graphics capabilities in the PostScript language) and
an interpreter for Portable Document Format (PDF) files. Ghostscript
translates PostScript code into many common, bitmapped formats, like
those understood by your printer or screen. Ghostscript is normally
used to display PostScript files and to print PostScript files to
non-PostScript printers.
If you need to display PostScript files or print them to
non-PostScript printers, you should install ghostscript. If you
install ghostscript, you also need to install the ghostscript-fonts
package.
——————————————————————————–
Update Information:
Security fixes release for these CVEs: *
[CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use-
after-free and application crash)* *
[CVE-2016-10218](https://access.redhat.com/security/cve/CVE-2016-10218) *(NULL
pointer dereference and application crash)* *
[CVE-2016-10219](https://access.redhat.com/security/cve/CVE-2016-10219)
*(divide-by-zero error and application crash)* *
[CVE-2016-10220](https://access.redhat.com/security/cve/CVE-2016-10220) *(NULL
pointer dereference and application crash)* *
[CVE-2017-5951](https://access.redhat.com/security/cve/CVE-2017-5951) *(NULL
pointer dereference and application crash)* *
[CVE-2017-7975](https://access.redhat.com/security/cve/CVE-2017-7975)
*(application crash or possible execution of arbitrary code)* *
[CVE-2017-8291](https://access.redhat.com/security/cve/CVE-2017-8291) *( -dSAFER
bypass and remote command execution)*
——————————————————————————–
References:
[ 1 ] Bug #1441581 – CVE-2016-10217 CVE-2016-10218 CVE-2016-10219 CVE-2016-10220 CVE-2016-10317 CVE-2017-5951 ghostscript: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1441581
[ 2 ] Bug #1443934 – CVE-2017-7885 CVE-2017-7975 CVE-2017-7976 ghostscript: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1443934
[ 3 ] Bug #1446064 – CVE-2017-8291 ghostscript: -dSAFER bypass and command execution via a “/OutputFile (%pipe%” substring [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1446064
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade ghostscript’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org