[SECURITY] [DSA 4569-1] ghostscript security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4569-1                   security@xxxxxxxxxx
https://www.debian.org/security/                     Salvatore Bonaccorso
November 14, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ghostscript
CVE ID         : CVE-2019-14869

Manfred Paul and Lukas Schauer reported that the .charkeys procedure in
Ghostscript, the GPL PostScript/PDF interpreter, does not properly
restrict privileged calls, which could result in bypass of file system
restrictions of the dSAFER sandbox.

For the oldstable distribution (stretch), this problem has been fixed
in version 9.26a~dfsg-0+deb9u6.

For the stable distribution (buster), this problem has been fixed in
version 9.27~dfsg-2+deb10u3.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/ghostscript

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl3NyIZfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0SIEQ//ZQ2brpwtvsjfwlORLcfH96jAuxH3GkUyqdD+l05zIV6VDBiN6LhPDl/d
upsuJtqRP1yhjpNuQeXR9vgbM4jdbRuqb9JeITAAfSII+wfF8yMGgdbM0QY/0kTp
I7oI6n4HqWrbLqa6Ea3Qhgk2i9fBJTQ92TQuiVDFrWPOLtoA5Pj5i9xf219P16gu
7v44/zB6X35Vq+5iMNcQQ9oRCX5H/hnrGO8NFgcbnnuR6vIHyBzPfisesbTpNfxx
GLTAmZTk3CyDWQvA5wWlWOtAe2ruVLfFK3ZtfSN7jxwMwsbng3v9KXfFtsJIKT0E
1pE7tf63JdFBpcmn2Kpbu32da18uwhawfi/EMxIW99Mpv+P5rXO0dvC5GKoEvkBD
7NM2RmYHAxLSkGmmY5MYZgPBE1SFNNXWlmXexqPgoGmAQT5elhMQq83CcSUzTgn5
dB/Ql/07O/OdF8uP7vFovJqDULk0mYkY2Lci1GzjLpk5SNZi44ZWO83Jjz9GuE+C
IanEjurkG0KiIosJDBfR+wpwktpjXuWCriDCK8FA0jfbUbnVTpElqF/PB3h/lsFv
mVyIPriJ9GcLYp43E6iFUUUFGr2sOae0iLuDd5HnIuhHkusN3av3hrT3O+h9onch
fJXl7buH9oESAjOtvBkYjVpeWNw6x2m4AVJ5InSXUv8KTe5zEOU=
=xllT
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux