lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 07 Sep 2019 15:42:39 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4518-1] ghostscript security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4518-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 07, 2019                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ghostscript
CVE ID         : CVE-2019-14811 CVE-2019-14812 CVE-2019-14813 CVE-2019-14817

It was discovered that various procedures in Ghostscript, the GPL
PostScript/PDF interpreter, do not properly restrict privileged calls,
which could result in bypass of file system restrictions of the dSAFER
sandbox.

For the oldstable distribution (stretch), these problems have been fixed
in version 9.26a~dfsg-0+deb9u5.

For the stable distribution (buster), these problems have been fixed in
version 9.27~dfsg-2+deb10u2.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/ghostscript

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=VN8W
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists