ghostscript-8.70-6.6.0.1.AXS3
エラータID: AXSA:2012-97:01
Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Ghostscript translates PostScript code into many common, bitmapped formats, like those understood by your printer or screen. Ghostscript is normally used to display PostScript files and to print PostScript files to non-PostScript printers.
If you need to display PostScript files or print them to non-PostScript printers, you should install ghostscript. If you install ghostscript, you also need to install the ghostscript-fonts package.
Security issues fixed with this release:
CVE-2009-3743
Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow.
CVE-2010-2055
Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program.
CVE-2010-4054
The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
CVE-2010-4820
No description available at the time of writing, use the CVE link.
Update packages.
Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow.
Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
Untrusted search path vulnerability in Ghostscript 8.62 allows local users to execute arbitrary PostScript code via a Trojan horse Postscript library file in Encoding/ under the current working directory, a different vulnerability than CVE-2010-2055.
N/A
SRPMS
- ghostscript-8.70-6.6.0.1.AXS3.src.rpm
MD5: 5698a3779bccd33385019360c051b00b
SHA-256: cf74f4b7048336f4280929d9eebb04188be92ff0d5290e9650ff9173aae7e715
Size: 16.92 MB
Asianux Server 3 for x86
- ghostscript-8.70-6.6.0.1.AXS3.i386.rpm
MD5: b575eb3182a0372db4011fd1a1ead120
SHA-256: 04ca3498e6f9a64b9744b3bacbe84f757627bb66c0b9f55f7ef3f1060e9f250b
Size: 9.00 MB - ghostscript-devel-8.70-6.6.0.1.AXS3.i386.rpm
MD5: 74f95d333a126c06de1ba56d49c0f988
SHA-256: cb57763690d7a0fddd3ec1cca6fccef68a5eaf67e3b742e555fcd8a2a3278a45
Size: 43.50 kB - ghostscript-gtk-8.70-6.6.0.1.AXS3.i386.rpm
MD5: e02c7116b7dd509829b0057b4a6b6dc1
SHA-256: 42f117b483ecb39c13351eff538c46bde1a24d7d5751d96128cf09c47e662527
Size: 35.33 kB
Asianux Server 3 for x86_64
- ghostscript-8.70-6.6.0.1.AXS3.x86_64.rpm
MD5: ad05479c84bb5204f9d0386f3e62491c
SHA-256: 61a48b5873430c9880efbe13eab20abf82b91a1725c90ca84e2477147327fdc5
Size: 8.95 MB - ghostscript-devel-8.70-6.6.0.1.AXS3.x86_64.rpm
MD5: 90d3bb3905bfd65b15126f29f6cdc82a
SHA-256: 05f5d45e593166c27d3217c6a83b59ca1197ebac1253e4adddea148e3d9b592b
Size: 44.08 kB - ghostscript-gtk-8.70-6.6.0.1.AXS3.x86_64.rpm
MD5: fa06187385342ca65bc66102a40aefa8
SHA-256: 74cbde34cb7be02ff5681e036225d0adf3ded2325229b87d250db9a4e42eb2da
Size: 35.21 kB