ELSA-2018-3650

ELSA-2018-3650 - ghostscript security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-11-26

Description


[9.07-31.el7_6.1]
- Remove as many non-standard operators as possible to make the codebase
closer to upstream for later CVEs
- Resolves: #1621383 - CVE-2018-16511 ghostscript: missing type check in type
checker (699659)
- Resolves: #1621159 - CVE-2018-15908 ghostscript: .tempfile file permission
issues (699657)
- Resolves: #1621381 - CVE-2018-15909 ghostscript: shading_param incomplete
type checking (699660)


Related CVEs


CVE-2018-15909
CVE-2018-16511
CVE-2018-15908
CVE-2018-16539

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) ghostscript-9.07-31.el7_6.1.src.rpmd554e0588827056be2b2b09e4a8cc088858e20c67c8422940dda5010d03db5f6ELSA-2024-4549ol7_aarch64_latest
ghostscript-9.07-31.el7_6.1.src.rpmd554e0588827056be2b2b09e4a8cc088858e20c67c8422940dda5010d03db5f6ELSA-2024-4549ol7_aarch64_optional_latest
ghostscript-9.07-31.el7_6.1.aarch64.rpm44e249743a906aa4644b31d738327fbb3200285227bfb52f89cdd22b8df09015ELSA-2024-4549ol7_aarch64_latest
ghostscript-cups-9.07-31.el7_6.1.aarch64.rpmeabcbcd62ad17bda4ce78de4dea1da36405aac361bf050cb73b4d6b0a06e75f3ELSA-2024-4549ol7_aarch64_latest
ghostscript-devel-9.07-31.el7_6.1.aarch64.rpm26f03606c3e2a4e2ff0bc5a2893981d7d49721d0ff7859c7def9b682ed326032ELSA-2019-1017ol7_aarch64_optional_latest
ghostscript-doc-9.07-31.el7_6.1.noarch.rpmc6f1d1aa857d00d2bf1925124ea809a484378d69cefbadd6ad0d07ced1758fdaELSA-2024-4549ol7_aarch64_optional_latest
ghostscript-gtk-9.07-31.el7_6.1.aarch64.rpmb63e7bae4b557a0830b5be5fd712a90da63f94fdc9ca53f0721ed9f1df50d3ecELSA-2024-4549ol7_aarch64_optional_latest
Oracle Linux 7 (x86_64) ghostscript-9.07-31.el7_6.1.src.rpmd554e0588827056be2b2b09e4a8cc088858e20c67c8422940dda5010d03db5f6ELSA-2024-4549ol7_x86_64_latest
ghostscript-9.07-31.el7_6.1.src.rpmd554e0588827056be2b2b09e4a8cc088858e20c67c8422940dda5010d03db5f6ELSA-2024-4549ol7_x86_64_optional_latest
ghostscript-9.07-31.el7_6.1.src.rpmd554e0588827056be2b2b09e4a8cc088858e20c67c8422940dda5010d03db5f6ELSA-2024-4549ol7_x86_64_u6_patch
ghostscript-9.07-31.el7_6.1.i686.rpm40a93382941c267c999d43a94a5eb92f596d1af1883e4de58677cc24e18fa131ELSA-2024-4549ol7_x86_64_latest
ghostscript-9.07-31.el7_6.1.i686.rpm40a93382941c267c999d43a94a5eb92f596d1af1883e4de58677cc24e18fa131ELSA-2024-4549ol7_x86_64_u6_patch
ghostscript-9.07-31.el7_6.1.x86_64.rpmc82029aea7f72055e91455a34b0210b1d8a535a1a4dec1b459e5e3cd1f16aa81ELSA-2024-4549ol7_x86_64_latest
ghostscript-9.07-31.el7_6.1.x86_64.rpmc82029aea7f72055e91455a34b0210b1d8a535a1a4dec1b459e5e3cd1f16aa81ELSA-2024-4549ol7_x86_64_u6_patch
ghostscript-cups-9.07-31.el7_6.1.x86_64.rpmc19abd26739545615dc8156092f61307d60eed13cc687e16c5a9a20721b23c92ELSA-2024-4549ol7_x86_64_latest
ghostscript-cups-9.07-31.el7_6.1.x86_64.rpmc19abd26739545615dc8156092f61307d60eed13cc687e16c5a9a20721b23c92ELSA-2024-4549ol7_x86_64_u6_patch
ghostscript-devel-9.07-31.el7_6.1.i686.rpmad883feeceb7789dd71a87ea00a35766da95f3c4d81b1f17787d7608feb641dbELSA-2019-1017ol7_x86_64_optional_latest
ghostscript-devel-9.07-31.el7_6.1.x86_64.rpme124e3a287795c5382267fa2d65733c4f5d2ae305b60190bdb3a5673a25b840eELSA-2019-1017ol7_x86_64_optional_latest
ghostscript-doc-9.07-31.el7_6.1.noarch.rpmc6f1d1aa857d00d2bf1925124ea809a484378d69cefbadd6ad0d07ced1758fdaELSA-2024-4549ol7_x86_64_optional_latest
ghostscript-gtk-9.07-31.el7_6.1.x86_64.rpmabc1f2817ba821fb6d550f386654f3d59e9920ed271529e4c0dd56e459ba5008ELSA-2024-4549ol7_x86_64_optional_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete