You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa ghostscript

Sigurnosni nedostatak programskog paketa ghostscript

SUSE Security Update: Security update for ghostscript-library
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:1322-1
Rating: important
References: #1036453
Cross-References: CVE-2017-8291
Affected Products:
SUSE OpenStack Cloud 5
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for ghostscript fixes the following security vulnerability:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a
crafted .eps document were exploited in the wild. (bsc#1036453)

This update is a reissue including the SUSE Linux Enterprise 11 SP3
product.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE OpenStack Cloud 5:

zypper in -t patch sleclo50sp3-ghostscript-library-13109=1

– SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-ghostscript-library-13109=1

– SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-ghostscript-library-13109=1

– SUSE Linux Enterprise Server 11-SP3-LTSS:

zypper in -t patch slessp3-ghostscript-library-13109=1

– SUSE Linux Enterprise Point of Sale 11-SP3:

zypper in -t patch sleposp3-ghostscript-library-13109=1

– SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-ghostscript-library-13109=1

– SUSE Linux Enterprise Debuginfo 11-SP3:

zypper in -t patch dbgsp3-ghostscript-library-13109=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE OpenStack Cloud 5 (x86_64):

ghostscript-fonts-other-8.62-32.46.1
ghostscript-fonts-rus-8.62-32.46.1
ghostscript-fonts-std-8.62-32.46.1
ghostscript-library-8.62-32.46.1
ghostscript-omni-8.62-32.46.1
ghostscript-x11-8.62-32.46.1
libgimpprint-4.2.7-32.46.1

– SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

ghostscript-devel-8.62-32.46.1
ghostscript-ijs-devel-8.62-32.46.1
libgimpprint-devel-4.2.7-32.46.1

– SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

ghostscript-fonts-other-8.62-32.46.1
ghostscript-fonts-rus-8.62-32.46.1
ghostscript-fonts-std-8.62-32.46.1
ghostscript-library-8.62-32.46.1
ghostscript-omni-8.62-32.46.1
ghostscript-x11-8.62-32.46.1
libgimpprint-4.2.7-32.46.1

– SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

ghostscript-fonts-other-8.62-32.46.1
ghostscript-fonts-rus-8.62-32.46.1
ghostscript-fonts-std-8.62-32.46.1
ghostscript-library-8.62-32.46.1
ghostscript-omni-8.62-32.46.1
ghostscript-x11-8.62-32.46.1
libgimpprint-4.2.7-32.46.1

– SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

ghostscript-fonts-other-8.62-32.46.1
ghostscript-fonts-rus-8.62-32.46.1
ghostscript-fonts-std-8.62-32.46.1
ghostscript-library-8.62-32.46.1
ghostscript-omni-8.62-32.46.1
ghostscript-x11-8.62-32.46.1
libgimpprint-4.2.7-32.46.1

– SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

ghostscript-library-debuginfo-8.62-32.46.1
ghostscript-library-debugsource-8.62-32.46.1

– SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

ghostscript-library-debuginfo-8.62-32.46.1
ghostscript-library-debugsource-8.62-32.46.1

References:

https://www.suse.com/security/cve/CVE-2017-8291.html
https://bugzilla.suse.com/1036453


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa thunderbird

Otkriveni su sigurnosni nedostaci u programskom paketu thunderbird za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju zaobilaženje sigurnosnih ograničenja,...

Close