[ubuntu/trusty-security] ghostscript 9.10~dfsg-0ubuntu10.5 (Accepted)
Emily Ratliff
emily.ratliff at canonical.com
Thu Dec 1 22:44:16 UTC 2016
ghostscript (9.10~dfsg-0ubuntu10.5) trusty-security; urgency=medium
* SECURITY UPDATE: Information disclosure through getenv, filenameforall
- debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
honor SAFER
- CVE-2013-5653
* SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
- debian/patches/CVE-2016-7976.patch: Add a file permissions callback
- CVE-2016-7976
* SECURITY UPDATE: use-after-free and remote code execution
- debian/patches/CVE-2016-7978.patch: Reference count device icc profile
- CVE-2016-7978
* SECURITY UPDATE: type confusion allows remote code execution
- debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
- CVE-2016-7979
* SECURITY UPDATE: NULL dereference
- debian/patches/CVE-2016-8602.patch: check for sufficient params
- CVE-2016-8602
* SECURITY UPDATE: fix SAFER permissions
- debian/patches/safer.patch: Be rigorous with SAFER permissions
Date: 2016-11-30 21:59:15.575791+00:00
Changed-By: Emily Ratliff <emily.ratliff at canonical.com>
https://launchpad.net/ubuntu/+source/ghostscript/9.10~dfsg-0ubuntu10.5
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list