[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1OZYwC-0000QO-5u@titan.mandriva.com>
Date: Fri, 16 Jul 2010 02:38:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2010:135 ] ghostscript
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2010:135
http://www.mandriva.com/security/
_______________________________________________________________________
Package : ghostscript
Date : July 15, 2010
Affected: Corporate 4.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in ghostscript:
Stack-based buffer overflow in the errprintf function in base/gsmisc.c
in ghostscript 8.64 through 8.70 allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a
crafted PDF file, as originally reported for debug logging code in
gdevcups.c in the CUPS output driver (CVE-2009-4270).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
_______________________________________________________________________
Updated Packages:
Corporate 4.0:
6678d58a9fbaa84101ca4ac373720e4d corporate/4.0/i586/ghostscript-8.15-46.4.20060mlcs4.i586.rpm
9f43cdac3dea08e4cf9d60f852423b11 corporate/4.0/i586/ghostscript-common-8.15-46.4.20060mlcs4.i586.rpm
0fa2c2e58dd00e9bf040c1e4374534d9 corporate/4.0/i586/ghostscript-dvipdf-8.15-46.4.20060mlcs4.i586.rpm
8b9d1be9204240d6976909628c5bb540 corporate/4.0/i586/ghostscript-module-X-8.15-46.4.20060mlcs4.i586.rpm
28141332bfa7f600abf6d039532e8ac2 corporate/4.0/i586/ghostscript-X-8.15-46.4.20060mlcs4.i586.rpm
437b0369e2f73652718ca9ba256dd8f2 corporate/4.0/i586/libgs8-8.15-46.4.20060mlcs4.i586.rpm
bc5f1d8a48c96b526fbd6ad6359ca1e3 corporate/4.0/i586/libgs8-devel-8.15-46.4.20060mlcs4.i586.rpm
95e7106fab4913bf518811c4e5bb9dde corporate/4.0/i586/libijs1-0.35-46.4.20060mlcs4.i586.rpm
7c436687ba13dd887f020df9bf349751 corporate/4.0/i586/libijs1-devel-0.35-46.4.20060mlcs4.i586.rpm
8cb775bb21996923fdf7fcda83f8b875 corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
885989f897cbdf06de4f162653aabf7c corporate/4.0/x86_64/ghostscript-8.15-46.4.20060mlcs4.x86_64.rpm
aebe81b69bac98a384ec372836f407e7 corporate/4.0/x86_64/ghostscript-common-8.15-46.4.20060mlcs4.x86_64.rpm
d1ebcf429948ce584862134b1cdce5b3 corporate/4.0/x86_64/ghostscript-dvipdf-8.15-46.4.20060mlcs4.x86_64.rpm
32a8d648d0bdd0112c6da2c0e88d7d7b corporate/4.0/x86_64/ghostscript-module-X-8.15-46.4.20060mlcs4.x86_64.rpm
53c9b945243254c7c0238a2f3424bae6 corporate/4.0/x86_64/ghostscript-X-8.15-46.4.20060mlcs4.x86_64.rpm
a4fb31d33215aede77de317d4a5af8cf corporate/4.0/x86_64/lib64gs8-8.15-46.4.20060mlcs4.x86_64.rpm
5a7b25aef9151d01dfeb17ab02e3f0ad corporate/4.0/x86_64/lib64gs8-devel-8.15-46.4.20060mlcs4.x86_64.rpm
30f3ea1e0c1d2596bf0134e39856afec corporate/4.0/x86_64/lib64ijs1-0.35-46.4.20060mlcs4.x86_64.rpm
a63f2d6d8347c2fc71b569db44b88508 corporate/4.0/x86_64/lib64ijs1-devel-0.35-46.4.20060mlcs4.x86_64.rpm
8cb775bb21996923fdf7fcda83f8b875 corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFMP38UmqjQ0CJFipgRAl7cAKDLnMKvCBP49oS8bk4sLoqS+CE5SwCfXSy9
BhEOEhIMuCStqROHvbHKFTg=
=WHzR
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists