--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2019-82acb29c1b
2019-02-18 01:25:49.106911
--------------------------------------------------------------------------------Name        : ghostscript
Product     : Fedora 28
Version     : 9.26
Release     : 1.fc28
URL         : https://ghostscript.com/
Summary     : Interpreter for PostScript language & PDF
Description :
This package provides useful conversion utilities based on Ghostscript software,
for converting PS, PDF and other document formats between each other.

Ghostscript is a suite of software providing an interpreter for Adobe Systems'
PostScript (PS) and Portable Document Format (PDF) page description languages.
Its primary purpose includes displaying (rasterization & rendering) and printing
of document pages, as well as conversions between different document formats.

--------------------------------------------------------------------------------Update Information:

- rebase to latest upstream version 9.26 - Security fix for CVE-2018-19478
CVE-2018-19134 CVE-2018-19477 CVE-2018-19476  CVE-2018-19475 CVE-2018-19409
CVE-2018-18284 CVE-2018-18073 CVE-2018-17961
--------------------------------------------------------------------------------ChangeLog:

* Thu Feb  7 2019 Martin Osvald  - 9.26-1
- rebase to latest upstream version 9.26
- spec change to remove gsdoc.el due to upstream 8bc783cb586
* Mon Sep 17 2018 David Kaspar [Dee'Kej]  - 9.25-1
- rebase to latest upstream version to fix additional issues found in 9.24
* Fri Sep 14 2018 David Kaspar [Dee'Kej]  - 9.24-3
- ghostscript-9.24-002-icc-PermitReading.patch removed
- ghostscript-9.24-002-fix-for-Canon-and-Kyocera-printers.patch added (bug #1626818)
- ghostscript-9.24-003-CVE-2018-16802.patch added (bug #1627960)
* Fri Sep  7 2018 Tom Callaway  - 9.24-2
- add upstream fix for reading in ICC profiles
* Wed Sep  5 2018 David Kaspar [Dee'Kej]  - 9.24-1
- rebase to latest upstream version, which contains important CVE fixes
- additional ZER0-DAY fixes added
* Wed Aug 29 2018 David Kaspar [Dee'Kej]  - 9.23-7
- ghostscript-9.23-002-fixes-for-set-of-CVEs-reported-by-Google.patch added
* Mon Jul 30 2018 David Kaspar [Dee'Kej]  - 9.23-6
- ghostscript-9.23-001-create-GC-descriptors-for-JPEG-passthrough.patch added (bug #1589467)
* Fri Jul 13 2018 Fedora Release Engineering  - 9.23-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Tue May 15 2018 David Kaspar [Dee'Kej]  - 9.23-4
- One more rebuild for libidn ABI fix (BZ#'s 1573961 and 1566414)
* Mon May 14 2018 David Kaspar [Dee'Kej]  - 9.23-3
- %conflicts_vers bumped to fix F27->F28 upgrade
* Thu May 10 2018 Stephen Gallagher  - 9.23-2.1
- Rebuilding for libidn ABI fix (BZ#'s 1573961 and 1566414)
* Mon Apr 23 2018 David Kaspar [Dee'Kej]  - 9.23-2
- Fix for CVE-2018-10194 added (bug #1569821)
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1656319 - CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1656319
  [ 2 ] Bug #1656320 - CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1656320
  [ 3 ] Bug #1658244 - [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV
        https://bugzilla.redhat.com/show_bug.cgi?id=1658244
  [ 4 ] Bug #1654470 - CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1654470
  [ 5 ] Bug #1654465 - CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1654465
  [ 6 ] Bug #1654460 - CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1654460
  [ 7 ] Bug #1652584 - CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1652584
  [ 8 ] Bug #1642943 - CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1642943
  [ 9 ] Bug #1642585 - CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1642585
  [ 10 ] Bug #1642579 - CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1642579
  [ 11 ] Bug #1663896 - GS fails to process many EPS files - Error: /nocurrentpoint in --currentpoint--        https://bugzilla.redhat.com/show_bug.cgi?id=1663896
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-82acb29c1b' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Fedora 28: ghostscript Security Update 2019-82acb29c1b

February 18, 2019
- rebase to latest upstream version 9.26 - Security fix for CVE-2018-19478 CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409 CVE-2018-18284 CVE-2018-18073 ...

Summary

This package provides useful conversion utilities based on Ghostscript software,

for converting PS, PDF and other document formats between each other.

Ghostscript is a suite of software providing an interpreter for Adobe Systems'

PostScript (PS) and Portable Document Format (PDF) page description languages.

Its primary purpose includes displaying (rasterization & rendering) and printing

of document pages, as well as conversions between different document formats.

- rebase to latest upstream version 9.26 - Security fix for CVE-2018-19478

CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409

CVE-2018-18284 CVE-2018-18073 CVE-2018-17961

* Thu Feb 7 2019 Martin Osvald - 9.26-1

- rebase to latest upstream version 9.26

- spec change to remove gsdoc.el due to upstream 8bc783cb586

* Mon Sep 17 2018 David Kaspar [Dee'Kej] - 9.25-1

- rebase to latest upstream version to fix additional issues found in 9.24

* Fri Sep 14 2018 David Kaspar [Dee'Kej] - 9.24-3

- ghostscript-9.24-002-icc-PermitReading.patch removed

- ghostscript-9.24-002-fix-for-Canon-and-Kyocera-printers.patch added (bug #1626818)

- ghostscript-9.24-003-CVE-2018-16802.patch added (bug #1627960)

* Fri Sep 7 2018 Tom Callaway - 9.24-2

- add upstream fix for reading in ICC profiles

* Wed Sep 5 2018 David Kaspar [Dee'Kej] - 9.24-1

- rebase to latest upstream version, which contains important CVE fixes

- additional ZER0-DAY fixes added

* Wed Aug 29 2018 David Kaspar [Dee'Kej] - 9.23-7

- ghostscript-9.23-002-fixes-for-set-of-CVEs-reported-by-Google.patch added

* Mon Jul 30 2018 David Kaspar [Dee'Kej] - 9.23-6

- ghostscript-9.23-001-create-GC-descriptors-for-JPEG-passthrough.patch added (bug #1589467)

* Fri Jul 13 2018 Fedora Release Engineering - 9.23-5

- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild

* Tue May 15 2018 David Kaspar [Dee'Kej] - 9.23-4

- One more rebuild for libidn ABI fix (BZ#'s 1573961 and 1566414)

* Mon May 14 2018 David Kaspar [Dee'Kej] - 9.23-3

- %conflicts_vers bumped to fix F27->F28 upgrade

* Thu May 10 2018 Stephen Gallagher - 9.23-2.1

- Rebuilding for libidn ABI fix (BZ#'s 1573961 and 1566414)

* Mon Apr 23 2018 David Kaspar [Dee'Kej] - 9.23-2

- Fix for CVE-2018-10194 added (bug #1569821)

[ 1 ] Bug #1656319 - CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1656319

[ 2 ] Bug #1656320 - CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1656320

[ 3 ] Bug #1658244 - [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV

https://bugzilla.redhat.com/show_bug.cgi?id=1658244

[ 4 ] Bug #1654470 - CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1654470

[ 5 ] Bug #1654465 - CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1654465

[ 6 ] Bug #1654460 - CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1654460

[ 7 ] Bug #1652584 - CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1652584

[ 8 ] Bug #1642943 - CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1642943

[ 9 ] Bug #1642585 - CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1642585

[ 10 ] Bug #1642579 - CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1642579

[ 11 ] Bug #1663896 - GS fails to process many EPS files - Error: /nocurrentpoint in --currentpoint-- https://bugzilla.redhat.com/show_bug.cgi?id=1663896

su -c 'dnf upgrade --advisory FEDORA-2019-82acb29c1b' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

FEDORA-2019-82acb29c1b 2019-02-18 01:25:49.106911 Product : Fedora 28 Version : 9.26 Release : 1.fc28 URL : https://ghostscript.com/ Summary : Interpreter for PostScript language & PDF Description : This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats. - rebase to latest upstream version 9.26 - Security fix for CVE-2018-19478 CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409 CVE-2018-18284 CVE-2018-18073 CVE-2018-17961 * Thu Feb 7 2019 Martin Osvald - 9.26-1 - rebase to latest upstream version 9.26 - spec change to remove gsdoc.el due to upstream 8bc783cb586 * Mon Sep 17 2018 David Kaspar [Dee'Kej] - 9.25-1 - rebase to latest upstream version to fix additional issues found in 9.24 * Fri Sep 14 2018 David Kaspar [Dee'Kej] - 9.24-3 - ghostscript-9.24-002-icc-PermitReading.patch removed - ghostscript-9.24-002-fix-for-Canon-and-Kyocera-printers.patch added (bug #1626818) - ghostscript-9.24-003-CVE-2018-16802.patch added (bug #1627960) * Fri Sep 7 2018 Tom Callaway - 9.24-2 - add upstream fix for reading in ICC profiles * Wed Sep 5 2018 David Kaspar [Dee'Kej] - 9.24-1 - rebase to latest upstream version, which contains important CVE fixes - additional ZER0-DAY fixes added * Wed Aug 29 2018 David Kaspar [Dee'Kej] - 9.23-7 - ghostscript-9.23-002-fixes-for-set-of-CVEs-reported-by-Google.patch added * Mon Jul 30 2018 David Kaspar [Dee'Kej] - 9.23-6 - ghostscript-9.23-001-create-GC-descriptors-for-JPEG-passthrough.patch added (bug #1589467) * Fri Jul 13 2018 Fedora Release Engineering - 9.23-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild * Tue May 15 2018 David Kaspar [Dee'Kej] - 9.23-4 - One more rebuild for libidn ABI fix (BZ#'s 1573961 and 1566414) * Mon May 14 2018 David Kaspar [Dee'Kej] - 9.23-3 - %conflicts_vers bumped to fix F27->F28 upgrade * Thu May 10 2018 Stephen Gallagher - 9.23-2.1 - Rebuilding for libidn ABI fix (BZ#'s 1573961 and 1566414) * Mon Apr 23 2018 David Kaspar [Dee'Kej] - 9.23-2 - Fix for CVE-2018-10194 added (bug #1569821) [ 1 ] Bug #1656319 - CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1656319 [ 2 ] Bug #1656320 - CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1656320 [ 3 ] Bug #1658244 - [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV https://bugzilla.redhat.com/show_bug.cgi?id=1658244 [ 4 ] Bug #1654470 - CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1654470 [ 5 ] Bug #1654465 - CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1654465 [ 6 ] Bug #1654460 - CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1654460 [ 7 ] Bug #1652584 - CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1652584 [ 8 ] Bug #1642943 - CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1642943 [ 9 ] Bug #1642585 - CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1642585 [ 10 ] Bug #1642579 - CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1642579 [ 11 ] Bug #1663896 - GS fails to process many EPS files - Error: /nocurrentpoint in --currentpoint-- https://bugzilla.redhat.com/show_bug.cgi?id=1663896 su -c 'dnf upgrade --advisory FEDORA-2019-82acb29c1b' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 28
Version : 9.26
Release : 1.fc28
URL : https://ghostscript.com/
Summary : Interpreter for PostScript language & PDF

Related News