lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1OZYwC-0000QO-5u@titan.mandriva.com>
Date: Fri, 16 Jul 2010 02:38:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2010:135 ] ghostscript


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:135
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : ghostscript
 Date    : July 15, 2010
 Affected: Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in ghostscript:
 
 Stack-based buffer overflow in the errprintf function in base/gsmisc.c
 in ghostscript 8.64 through 8.70 allows remote attackers to cause a
 denial of service (crash) and possibly execute arbitrary code via a
 crafted PDF file, as originally reported for debug logging code in
 gdevcups.c in the CUPS output driver (CVE-2009-4270).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270
 _______________________________________________________________________

 Updated Packages:

 Corporate 4.0:
 6678d58a9fbaa84101ca4ac373720e4d  corporate/4.0/i586/ghostscript-8.15-46.4.20060mlcs4.i586.rpm
 9f43cdac3dea08e4cf9d60f852423b11  corporate/4.0/i586/ghostscript-common-8.15-46.4.20060mlcs4.i586.rpm
 0fa2c2e58dd00e9bf040c1e4374534d9  corporate/4.0/i586/ghostscript-dvipdf-8.15-46.4.20060mlcs4.i586.rpm
 8b9d1be9204240d6976909628c5bb540  corporate/4.0/i586/ghostscript-module-X-8.15-46.4.20060mlcs4.i586.rpm
 28141332bfa7f600abf6d039532e8ac2  corporate/4.0/i586/ghostscript-X-8.15-46.4.20060mlcs4.i586.rpm
 437b0369e2f73652718ca9ba256dd8f2  corporate/4.0/i586/libgs8-8.15-46.4.20060mlcs4.i586.rpm
 bc5f1d8a48c96b526fbd6ad6359ca1e3  corporate/4.0/i586/libgs8-devel-8.15-46.4.20060mlcs4.i586.rpm
 95e7106fab4913bf518811c4e5bb9dde  corporate/4.0/i586/libijs1-0.35-46.4.20060mlcs4.i586.rpm
 7c436687ba13dd887f020df9bf349751  corporate/4.0/i586/libijs1-devel-0.35-46.4.20060mlcs4.i586.rpm 
 8cb775bb21996923fdf7fcda83f8b875  corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 885989f897cbdf06de4f162653aabf7c  corporate/4.0/x86_64/ghostscript-8.15-46.4.20060mlcs4.x86_64.rpm
 aebe81b69bac98a384ec372836f407e7  corporate/4.0/x86_64/ghostscript-common-8.15-46.4.20060mlcs4.x86_64.rpm
 d1ebcf429948ce584862134b1cdce5b3  corporate/4.0/x86_64/ghostscript-dvipdf-8.15-46.4.20060mlcs4.x86_64.rpm
 32a8d648d0bdd0112c6da2c0e88d7d7b  corporate/4.0/x86_64/ghostscript-module-X-8.15-46.4.20060mlcs4.x86_64.rpm
 53c9b945243254c7c0238a2f3424bae6  corporate/4.0/x86_64/ghostscript-X-8.15-46.4.20060mlcs4.x86_64.rpm
 a4fb31d33215aede77de317d4a5af8cf  corporate/4.0/x86_64/lib64gs8-8.15-46.4.20060mlcs4.x86_64.rpm
 5a7b25aef9151d01dfeb17ab02e3f0ad  corporate/4.0/x86_64/lib64gs8-devel-8.15-46.4.20060mlcs4.x86_64.rpm
 30f3ea1e0c1d2596bf0134e39856afec  corporate/4.0/x86_64/lib64ijs1-0.35-46.4.20060mlcs4.x86_64.rpm
 a63f2d6d8347c2fc71b569db44b88508  corporate/4.0/x86_64/lib64ijs1-devel-0.35-46.4.20060mlcs4.x86_64.rpm 
 8cb775bb21996923fdf7fcda83f8b875  corporate/4.0/SRPMS/ghostscript-8.15-46.4.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMP38UmqjQ0CJFipgRAl7cAKDLnMKvCBP49oS8bk4sLoqS+CE5SwCfXSy9
BhEOEhIMuCStqROHvbHKFTg=
=WHzR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ