FEDORA-2019-077a3f23c0 created by mosvald a year ago for Fedora 29
stable
  • rebase to latest upstream version 9.26
  • Security fix for CVE-2018-19478 CVE-2018-19134 CVE-2018-19477 CVE-2018-19476 CVE-2018-19475 CVE-2018-19409 CVE-2018-18284 CVE-2018-18073 CVE-2018-17961

How to install

sudo dnf upgrade --advisory=FEDORA-2019-077a3f23c0

This update has been submitted for testing by mosvald.

a year ago

mosvald edited this update.

a year ago

This update has been pushed to testing.

a year ago
User Icon besser82 commented & provided feedback a year ago
karma

Works great! LGTM! =)

User Icon vinumoses commented & provided feedback a year ago
karma

Works fine for me.

User Icon vinumoses commented & provided feedback a year ago
karma

Works fine for me.

User Icon vinumoses commented & provided feedback a year ago
karma

Works fine for me.

User Icon atim provided feedback a year ago
karma

This update has been submitted for batched by bodhi.

a year ago

This update has been submitted for stable by mosvald.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
3
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
modified
a year ago
BZ#1642579 CVE-2018-17961 ghostscript: saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) [fedora-all]
0
0
BZ#1642585 CVE-2018-18073 ghostscript: Saved execution stacks can leak operator arrays [fedora-all]
0
0
BZ#1642943 CVE-2018-18284 ghostscript: 1Policy operator allows a sandbox protection bypass [fedora-all]
0
0
BZ#1652584 CVE-2018-19409 ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c [fedora-all]
0
0
BZ#1654460 CVE-2018-19475 ghostscript: access bypass in psi/zdevice2.c (700153) [fedora-all]
0
0
BZ#1654465 CVE-2018-19476 ghostscript: access bypass in psi/zicc.c [fedora-all]
0
0
BZ#1654470 CVE-2018-19477 ghostscript: access bypass in psi/zfjbig2.c (700168) [fedora-all]
0
0
BZ#1656319 CVE-2018-19478 ghostscript: Attempting to open a carefully crafted PDF file results in long-running computation (699856) [fedora-all]
0
0
BZ#1656320 CVE-2018-19134 ghostscript: Type confusion in setpattern (700141) [fedora-all]
0
0
BZ#1658244 [abrt] ghostscript: SkipPage(): gs killed by SIGSEGV
0
0
BZ#1663896 GS fails to process many EPS files - Error: /nocurrentpoint in --currentpoint--
0
0

Automated Test Results