ELSA-2009-0421

ELSA-2009-0421 - ghostscript security update

Type:SECURITY
Impact:MODERATE
Release Date:2009-04-14

Description



[8.15.2-9.4:.7]
- Added extra checking for CVE-2009-0792 (bug #491853).

[8.15.2-9.4:.6]
- Applied patch to fix gdevpdtb buffer overflow (bug #493445).
- Applied patch to fix scfd buffer underrun (bug #493442).
- Applied patch to fix CVE-2009-0792 (bug #491853).
- Applied patch to fix CVE-2009-0196 (bug #493379).


Related CVEs


CVE-2007-6725
CVE-2009-0196
CVE-2008-6679
CVE-2009-0792

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) ghostscript-8.15.2-9.4.el5_3.7.src.rpm114f42609efaa07a1aa14d6015e336eb8548d334ee37579d6fcf75c072d08ff5ELBA-2013-1277el5_u3_i386_patch
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm91e6e88fcb7d88c07e5a8862b1ed979362b795fec96919ef58dfa0bd2a51ca00ELBA-2013-1277el5_u3_i386_patch
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm13236b1d84c23b108857578379db71740021f392aa2eb0593428ecbe3f79d375ELBA-2013-1277el5_u3_i386_patch
ghostscript-gtk-8.15.2-9.4.el5_3.7.i386.rpmc03563e09a8ecd0afbfbcf0927213984dcfa59555ed136b8db811a788badc6daELBA-2013-1277el5_u3_i386_patch
Oracle Linux 5 (x86_64) ghostscript-8.15.2-9.4.el5_3.7.src.rpm114f42609efaa07a1aa14d6015e336eb8548d334ee37579d6fcf75c072d08ff5ELBA-2013-1277el5_u3_x86_64_patch
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm91e6e88fcb7d88c07e5a8862b1ed979362b795fec96919ef58dfa0bd2a51ca00ELBA-2013-1277el5_u3_x86_64_patch
ghostscript-8.15.2-9.4.el5_3.7.x86_64.rpma7360c3a7e5856e02077a5d7ec6fd3fc23bb609b0615935d46a40aa1aac1360aELBA-2013-1277el5_u3_x86_64_patch
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm13236b1d84c23b108857578379db71740021f392aa2eb0593428ecbe3f79d375ELBA-2013-1277el5_u3_x86_64_patch
ghostscript-devel-8.15.2-9.4.el5_3.7.x86_64.rpmd63649c5989e5f2ad02186a343ee13c7b927e77d2e7fd2503cdbe72acb7ac516ELBA-2013-1277el5_u3_x86_64_patch
ghostscript-gtk-8.15.2-9.4.el5_3.7.x86_64.rpm9b1a7632e03797862dc7b57c7d2ad310a7964c65912e2b36485e2779446c7bf5ELBA-2013-1277el5_u3_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete