Thread: [Cucumber-linux-security] ghostscript (security update is available)
A general purpose desktop and server Linux distribution.
Brought to you by:
z5t1
From: Z5T1 <z5...@z5...> - 2017-11-17 03:09:17
Attachments:
signature.asc
|
Update Information A security update is available for ghostscript for the following versions of Cucumber Linux: * 1.0 * 1.1 Alpha Here are the details from the Cucumber 1.0 changelog: +----------------+ Thu Nov 16 11:47:15 EST 2017 apps-base/ghostscript upgraded from 9.21 to 9.22 to "many AddressSanitizer, Valgrind and Coverity [security] issues". For more information see: https://www.ghostscript.com/doc/9.22/News.htm http://security.cucumberlinux.com/security/details.php?id=130 multilib/apps-base/ghostscript-lib_i686 upgraded from 9.21 to 9.22 (x86_64 only) * SECURITY FIX * +----------------+ ------------------------------------------------------------------------ CLD and CVE Information This update is associated with the following Cucumber Linux Deficiency (CLD) and CVE numbers: * CLD-130 [NULL] (http://security.cucumberlinux.com/security/details.php?id=130) More information about these CLDs can be found at their respective pages on the Cucumber Linux Security Advisory Tracker (these are the URLs in parenthesis above). ------------------------------------------------------------------------ Installing the Update The updated package can be installed via Pickle by running the following commands (as root): # pickle --update # pickle Make sure ghostscript is selected on the update list, and then select Ok. Pickle will then install the updated package. If you prefer to download the updated package manually, it can be found on the mirror at http://mirror.cucumberlinux.com/cucumber/. ------------------------------------------------------------------------ The Cucumber Linux Security Team cuc...@li... <mailto:cuc...@li...> http://www.cucumberlinux.com/security.php |
From: Scott C. <sc...@cu...> - 2018-04-19 16:07:43
Attachments:
signature.asc
|
Update Information A security update is available for ghostscript for the following versions of Cucumber Linux: * 1.0 * 1.1 Here are the details from the Cucumber 1.1 changelog: +----------------+ Thu Apr 19 11:22:35 EDT 2018 apps-base/ghostscript rebuilt (build 2) to fix CVE-2018-10194, a security vulnerability which allowed for remote attackers to cause a denial of service (application crash) and possibly allowed for other unspecified impacts. For more information see: https://security.cucumberlinux.com/security/details.php?id=367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194 multilib/apps-base/ghostscript-lib_i686 rebuilt (build 2, x86_64 only) * SECURITY FIX * +----------------+ ------------------------------------------------------------------------ CLD and CVE Information This update is associated with the following Cucumber Linux Deficiency (CLD) and CVE numbers: * CLD-367 [CVE-2018-10194] (https://security.cucumberlinux.com/security/details.php?id=367) More information about these CLDs can be found at their respective pages on the Cucumber Linux Security Advisory Tracker (these are the URLs in parenthesis above). ------------------------------------------------------------------------ Installing the Update The updated package can be installed via Pickle by running the following commands (as root): # pickle --update # pickle Make sure ghostscript is selected on the update list, and then select Ok. Pickle will then install the updated package. If you prefer to download the updated package manually, it can be found on the mirror at http://mirror.cucumberlinux.com/cucumber/. ------------------------------------------------------------------------ The Cucumber Linux Security Team cuc...@li... <mailto:cuc...@li...> https://www.cucumberlinux.com/security.php |
From: Scott C. <sc...@cu...> - 2018-08-31 18:21:46
Attachments:
signature.asc
|
Update Information A security update is available for ghostscript for the following versions of Cucumber Linux: * 1.0 * 1.1 Here are the details from the Cucumber 1.1 changelog: +----------------+ Fri Aug 31 13:16:34 EDT 2018 apps-base/ghostscript rebuilt (build 3) to fix several security vulnerabilities: CVE-2018-15908, CVE-2018-15909, CVE-2018-15910 and CVE-2018-15911 . The last three vulnerabilities allowed for a crash of the ghostscript interpreter and potential code execution if an attacker could supply a maliciously crafted postscript file. CVE-2018-15908 allowed for an attacker to bypass write restrictions. For more information see: https://security.cucumberlinux.com/security/details.php?id=534 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908 https://security.cucumberlinux.com/security/details.php?id=532 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909 https://security.cucumberlinux.com/security/details.php?id=533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910 https://security.cucumberlinux.com/security/details.php?id=535 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911 multilib/apps-base/ghostscript-lib_i686 rebuilt (build 3, x86_64 only) * SECURITY FIX * +----------------+ ------------------------------------------------------------------------ CLD and CVE Information This update is associated with the following Cucumber Linux Deficiency (CLD) and CVE numbers: * CLD-532 [CVE-2018-15909] (https://security.cucumberlinux.com/security/details.php?id=532) * CLD-533 [CVE-2018-15910] (https://security.cucumberlinux.com/security/details.php?id=533) * CLD-534 [CVE-2018-15908] (https://security.cucumberlinux.com/security/details.php?id=534) * CLD-535 [CVE-2018-15911] (https://security.cucumberlinux.com/security/details.php?id=535) More information about these CLDs can be found at their respective pages on the Cucumber Linux Security Advisory Tracker (these are the URLs in parenthesis above). ------------------------------------------------------------------------ Installing the Update The updated package can be installed via Pickle by running the following commands (as root): # pickle --update # pickle Make sure ghostscript is selected on the update list, and then select Ok. Pickle will then install the updated package. If you prefer to download the updated package manually, it can be found on the mirror at http://mirror.cucumberlinux.com/cucumber/. ------------------------------------------------------------------------ The Cucumber Linux Security Team cuc...@li... <mailto:cuc...@li...> https://www.cucumberlinux.com/security.php |
From: Scott C. <sc...@cu...> - 2018-10-18 23:58:59
Attachments:
signature.asc
|
Update Information A security update is available for ghostscript for the following versions of Cucumber Linux: * 1.0 * 1.1 Here are the details from the Cucumber 1.1 changelog: +----------------+ Thu Oct 18 17:35:49 EDT 2018 apps-base/ghostscript upgraded from 9.22 to 9.25 to fix several security vulnerabilities that allowed for bypassing of sandbox controls: CVE-2018-17183, CVE-2018-16802, CVE-2018-16585, CVE-2018-16543, CVE-2018-16542, CVE-2018-16541, CVE-2018-16540, CVE-2018-16539, CVE-2018-16513, CVE-2018-16511, CVE-2018-16510 and CVE-2018-16509. For more information see: https://security.cucumberlinux.com/security/details.php?id=559 https://security.cucumberlinux.com/security/details.php?id=553 https://security.cucumberlinux.com/security/details.php?id=552 https://security.cucumberlinux.com/security/details.php?id=551 https://security.cucumberlinux.com/security/details.php?id=550 https://security.cucumberlinux.com/security/details.php?id=549 https://security.cucumberlinux.com/security/details.php?id=548 https://security.cucumberlinux.com/security/details.php?id=547 https://security.cucumberlinux.com/security/details.php?id=545 https://security.cucumberlinux.com/security/details.php?id=544 https://security.cucumberlinux.com/security/details.php?id=543 https://security.cucumberlinux.com/security/details.php?id=542 multilib/apps-base/ghostscript-lib_i686 upgraded from 9.22 to 9.25 * SECURITY FIX * +----------------+ ------------------------------------------------------------------------ CLD and CVE Information This update is associated with the following Cucumber Linux Deficiency (CLD) and CVE numbers: * CLD-542 [CVE-2018-16509] (https://security.cucumberlinux.com/security/details.php?id=542) * CLD-543 [CVE-2018-16510] (https://security.cucumberlinux.com/security/details.php?id=543) * CLD-544 [CVE-2018-16511] (https://security.cucumberlinux.com/security/details.php?id=544) * CLD-545 [CVE-2018-16513] (https://security.cucumberlinux.com/security/details.php?id=545) * CLD-547 [CVE-2018-16539] (https://security.cucumberlinux.com/security/details.php?id=547) * CLD-548 [CVE-2018-16540] (https://security.cucumberlinux.com/security/details.php?id=548) * CLD-549 [CVE-2018-16541] (https://security.cucumberlinux.com/security/details.php?id=549) * CLD-550 [CVE-2018-16542] (https://security.cucumberlinux.com/security/details.php?id=550) * CLD-551 [CVE-2018-16543] (https://security.cucumberlinux.com/security/details.php?id=551) * CLD-552 [CVE-2018-16585] (https://security.cucumberlinux.com/security/details.php?id=552) * CLD-553 [CVE-2018-16802] (https://security.cucumberlinux.com/security/details.php?id=553) * CLD-559 [CVE-2018-17183] (https://security.cucumberlinux.com/security/details.php?id=559) More information about these CLDs can be found at their respective pages on the Cucumber Linux Security Advisory Tracker (these are the URLs in parenthesis above). ------------------------------------------------------------------------ Installing the Update The updated package can be installed via Pickle by running the following commands (as root): # pickle --update # pickle Make sure ghostscript is selected on the update list, and then select Ok. Pickle will then install the updated package. If you prefer to download the updated package manually, it can be found on the mirror at http://mirror.cucumberlinux.com/cucumber/. ------------------------------------------------------------------------ The Cucumber Linux Security Team cuc...@li... <mailto:cuc...@li...> https://www.cucumberlinux.com/security.php |
From: Scott C. <sc...@cu...> - 2018-12-31 16:10:50
Attachments:
signature.asc
|
Update Information A security update is available for ghostscript for the following versions of Cucumber Linux: * 1.1 Here are the details from the Cucumber 1.1 changelog: +----------------+ Mon Dec 31 10:33:41 EST 2018 apps-base/ghostscript upgraded from 9.25 to 9.26. This is primarily a security update that contains fixes for several of the latest ghostscript vulnerabilities: CVE-2018-18073, CVE-2018-17961, CVE-2018-18284, CVE-2018-19475, CVE-2018-19476 and CVE-2018-19477 have been fixed. For more information see: https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26 https://security.cucumberlinux.com/security/details.php?id=583 https://security.cucumberlinux.com/security/details.php?id=582 https://security.cucumberlinux.com/security/details.php?id=588 https://security.cucumberlinux.com/security/details.php?id=613 https://security.cucumberlinux.com/security/details.php?id=614 https://security.cucumberlinux.com/security/details.php?id=615 multilib/apps-base/ghostscript-lib_i686 upgraded from 9.25 to 9.26 (x86_64 only) * SECURITY FIX * +----------------+ ------------------------------------------------------------------------ CLD and CVE Information This update is associated with the following Cucumber Linux Deficiency (CLD) and CVE numbers: * CLD-583 [CVE-2018-18073] (https://security.cucumberlinux.com/security/details.php?id=583) * CLD-582 [CVE-2018-17961] (https://security.cucumberlinux.com/security/details.php?id=582) * CLD-588 [CVE-2018-18284] (https://security.cucumberlinux.com/security/details.php?id=588) * CLD-613 [CVE-2018-19475] (https://security.cucumberlinux.com/security/details.php?id=613) * CLD-614 [CVE-2018-19476] (https://security.cucumberlinux.com/security/details.php?id=614) * CLD-615 [CVE-2018-19477] (https://security.cucumberlinux.com/security/details.php?id=615) More information about these CLDs can be found at their respective pages on the Cucumber Linux Security Advisory Tracker (these are the URLs in parenthesis above). ------------------------------------------------------------------------ Installing the Update The updated package can be installed via Pickle by running the following commands (as root): # pickle --update # pickle Make sure ghostscript is selected on the update list, and then select Ok. Pickle will then install the updated package. If you prefer to download the updated package manually, it can be found on the mirror at http://mirror.cucumberlinux.com/cucumber/. ------------------------------------------------------------------------ The Cucumber Linux Security Team cuc...@li... <mailto:cuc...@li...> https://www.cucumberlinux.com/security.php |