SUSE-SU-2012:0531-1: Security update for ghostscript
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Wed Apr 18 16:08:49 MDT 2012
SUSE Security Update: Security update for ghostscript
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0531-1
Rating: low
References: #545201 #635004 #649207
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update of ghostscript fixes two security issues:
* CVE-2009-3743: Off-by-one error in the TrueType
bytecode interpreter in Ghostscript in SUSE Linux
Enterprise 10 and 11 products allows remote attackers to
cause a denial of service (heap memory corruption) via a
malformed TrueType font in a document.
* CVE-2010-4054: The gs_type2_interpret function in
Ghostscript allows remote attackers to cause a denial of
service (incorrect pointer dereference and application
crash) via crafted font data in a compressed data stream.
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
ghostscript-fonts-other-8.15.4-16.14.1
ghostscript-fonts-rus-8.15.4-16.14.1
ghostscript-fonts-std-8.15.4-16.14.1
ghostscript-library-8.15.4-16.14.1
ghostscript-omni-8.15.4-16.14.1
ghostscript-x11-8.15.4-16.14.1
libgimpprint-4.2.7-62.14.1
libgimpprint-devel-4.2.7-62.14.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
ghostscript-fonts-other-8.15.4-16.14.1
ghostscript-fonts-std-8.15.4-16.14.1
ghostscript-library-8.15.4-16.14.1
ghostscript-x11-8.15.4-16.14.1
libgimpprint-4.2.7-62.14.1
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
ghostscript-fonts-rus-8.15.4-16.14.1
ghostscript-omni-8.15.4-16.14.1
libgimpprint-devel-4.2.7-62.14.1
References:
https://bugzilla.novell.com/545201
https://bugzilla.novell.com/635004
https://bugzilla.novell.com/649207
http://download.novell.com/patch/finder/?keywords=ed33b07c67b3e3c685b564c2b6d267ec
More information about the sle-updates
mailing list