--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2017-a606d224a5
2017-05-08 14:18:31.663321
--------------------------------------------------------------------------------Name        : ghostscript
Product     : Fedora 26
Version     : 9.20
Release     : 10.fc26
URL         : https://www.ghostscript.com/
Summary     : A PostScript interpreter and renderer
Description :
Ghostscript is a set of software that provides a PostScript
interpreter, a set of C procedures (the Ghostscript library, which
implements the graphics capabilities in the PostScript language) and
an interpreter for Portable Document Format (PDF) files. Ghostscript
translates PostScript code into many common, bitmapped formats, like
those understood by your printer or screen. Ghostscript is normally
used to display PostScript files and to print PostScript files to
non-PostScript printers.

If you need to display PostScript files or print them to
non-PostScript printers, you should install ghostscript. If you
install ghostscript, you also need to install the ghostscript-fonts
package.

--------------------------------------------------------------------------------Update Information:

Security fixes release for these CVEs:  *
[CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use-after-free and application crash)* *
[CVE-2016-10218](https://access.redhat.com/security/cve/CVE-2016-10218) *(NULL
pointer dereference and application crash)* *
[CVE-2016-10219](https://access.redhat.com/security/cve/CVE-2016-10219)
*(divide-by-zero error and application crash)* *
[CVE-2016-10220](https://access.redhat.com/security/cve/CVE-2016-10220) *(NULL
pointer dereference and application crash)* *
[CVE-2017-5951](https://access.redhat.com/security/cve/CVE-2017-5951) *(NULL
pointer dereference and application crash)* *
[CVE-2017-7975](https://access.redhat.com/security/cve/CVE-2017-7975)
*(application crash or possible execution of arbitrary code)* *
[CVE-2017-8291](https://access.redhat.com/security/cve/CVE-2017-8291) *( -dSAFER
bypass and remote command execution)*
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1441581 - CVE-2016-10217 CVE-2016-10218 CVE-2016-10219 CVE-2016-10220 CVE-2016-10317 CVE-2017-5951 ghostscript: various flaws [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1441581
  [ 2 ] Bug #1443934 - CVE-2017-7885 CVE-2017-7975 CVE-2017-7976 ghostscript: various flaws [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1443934
  [ 3 ] Bug #1446064 - CVE-2017-8291 ghostscript: -dSAFER bypass and command execution via a "/OutputFile (%pipe%" substring [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1446064
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade ghostscript' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 26: ghostscript Security Update

May 8, 2017
Security fixes release for these CVEs: * [CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use- after-free and application crash)* * [CVE-2016-10218](https:...

Summary

Ghostscript is a set of software that provides a PostScript

interpreter, a set of C procedures (the Ghostscript library, which

implements the graphics capabilities in the PostScript language) and

an interpreter for Portable Document Format (PDF) files. Ghostscript

translates PostScript code into many common, bitmapped formats, like

those understood by your printer or screen. Ghostscript is normally

used to display PostScript files and to print PostScript files to

non-PostScript printers.

If you need to display PostScript files or print them to

non-PostScript printers, you should install ghostscript. If you

install ghostscript, you also need to install the ghostscript-fonts

package.

Security fixes release for these CVEs: *

[CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use-after-free and application crash)* *

[CVE-2016-10218](https://access.redhat.com/security/cve/CVE-2016-10218) *(NULL

pointer dereference and application crash)* *

[CVE-2016-10219](https://access.redhat.com/security/cve/CVE-2016-10219)

*(divide-by-zero error and application crash)* *

[CVE-2016-10220](https://access.redhat.com/security/cve/CVE-2016-10220) *(NULL

pointer dereference and application crash)* *

[CVE-2017-5951](https://access.redhat.com/security/cve/CVE-2017-5951) *(NULL

pointer dereference and application crash)* *

[CVE-2017-7975](https://access.redhat.com/security/cve/CVE-2017-7975)

*(application crash or possible execution of arbitrary code)* *

[CVE-2017-8291](https://access.redhat.com/security/cve/CVE-2017-8291) *( -dSAFER

bypass and remote command execution)*

[ 1 ] Bug #1441581 - CVE-2016-10217 CVE-2016-10218 CVE-2016-10219 CVE-2016-10220 CVE-2016-10317 CVE-2017-5951 ghostscript: various flaws [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1441581

[ 2 ] Bug #1443934 - CVE-2017-7885 CVE-2017-7975 CVE-2017-7976 ghostscript: various flaws [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1443934

[ 3 ] Bug #1446064 - CVE-2017-8291 ghostscript: -dSAFER bypass and command execution via a "/OutputFile (%pipe%" substring [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1446064

su -c 'dnf upgrade ghostscript' at the command line.

For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

FEDORA-2017-a606d224a5 2017-05-08 14:18:31.663321 Product : Fedora 26 Version : 9.20 Release : 10.fc26 URL : https://www.ghostscript.com/ Summary : A PostScript interpreter and renderer Description : Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Ghostscript translates PostScript code into many common, bitmapped formats, like those understood by your printer or screen. Ghostscript is normally used to display PostScript files and to print PostScript files to non-PostScript printers. If you need to display PostScript files or print them to non-PostScript printers, you should install ghostscript. If you install ghostscript, you also need to install the ghostscript-fonts package. Security fixes release for these CVEs: * [CVE-2016-10217](https://access.redhat.com/security/cve/CVE-2016-10217) *(use-after-free and application crash)* * [CVE-2016-10218](https://access.redhat.com/security/cve/CVE-2016-10218) *(NULL pointer dereference and application crash)* * [CVE-2016-10219](https://access.redhat.com/security/cve/CVE-2016-10219) *(divide-by-zero error and application crash)* * [CVE-2016-10220](https://access.redhat.com/security/cve/CVE-2016-10220) *(NULL pointer dereference and application crash)* * [CVE-2017-5951](https://access.redhat.com/security/cve/CVE-2017-5951) *(NULL pointer dereference and application crash)* * [CVE-2017-7975](https://access.redhat.com/security/cve/CVE-2017-7975) *(application crash or possible execution of arbitrary code)* * [CVE-2017-8291](https://access.redhat.com/security/cve/CVE-2017-8291) *( -dSAFER bypass and remote command execution)* [ 1 ] Bug #1441581 - CVE-2016-10217 CVE-2016-10218 CVE-2016-10219 CVE-2016-10220 CVE-2016-10317 CVE-2017-5951 ghostscript: various flaws [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1441581 [ 2 ] Bug #1443934 - CVE-2017-7885 CVE-2017-7975 CVE-2017-7976 ghostscript: various flaws [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1443934 [ 3 ] Bug #1446064 - CVE-2017-8291 ghostscript: -dSAFER bypass and command execution via a "/OutputFile (%pipe%" substring [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1446064 su -c 'dnf upgrade ghostscript' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 26
Version : 9.20
Release : 10.fc26
URL : https://www.ghostscript.com/
Summary : A PostScript interpreter and renderer

Related News