stable

ghostscript-9.26-1.fc28

FEDORA-2019-82acb29c1b created by mosvald 5 years ago for Fedora 28
  • rebase to latest upstream version 9.26
  • Security fix for CVE-2018-19478 CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409 CVE-2018-18284 CVE-2018-18073 CVE-2018-17961

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2019-82acb29c1b

This update has been submitted for testing by mosvald.

5 years ago

mosvald edited this update.

5 years ago

This update has been pushed to testing.

5 years ago

This update has reached 7 days in testing and can be pushed to stable now if the maintainer wishes

5 years ago

This update has been submitted for batched by mosvald.

5 years ago

This update has been submitted for stable by bodhi.

5 years ago

This update has been pushed to stable.

5 years ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
5 years ago
in testing
5 years ago
in stable
5 years ago
modified
5 years ago
BZ#1642579 CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all]
0
0
BZ#1642585 CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all]
0
0
BZ#1642943 CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all]
0
0
BZ#1652584 CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all]
0
0
BZ#1654460 CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all]
0
0
BZ#1654465 CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all]
0
0
BZ#1654470 CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all]
0
0
BZ#1656319 CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all]
0
0
BZ#1656320 CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all]
0
0
BZ#1658244 [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV
0
0
BZ#1663896 GS fails to process many EPS files - Error: /nocurrentpoint in --currentpoint--
0
0

Automated Test Results