DSA-4346-1 ghostscript -- security update

Related Vulnerabilities: CVE-2018-19134   CVE-2018-19409   CVE-2018-19475   CVE-2018-19476   CVE-2018-19477   CVE-2018-19478  

Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service or the execution of arbitrary code if a malformed Postscript file is processed (despite the -dSAFER sandbox being enabled). This update rebases ghostscript for stretch to the upstream version 9.26 which includes additional changes. For the stable distribution (stretch), these problems have been fixed in version 9.26~dfsg-0+deb9u1. We recommend that you upgrade your ghostscript packages. For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript

Debian Security Advisory

DSA-4346-1 ghostscript -- security update

Date Reported:
27 Nov 2018
Affected Packages:
ghostscript
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2018-19134, CVE-2018-19409, CVE-2018-19475, CVE-2018-19476, CVE-2018-19477, CVE-2018-19478.
More information:

Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service or the execution of arbitrary code if a malformed Postscript file is processed (despite the -dSAFER sandbox being enabled).

This update rebases ghostscript for stretch to the upstream version 9.26 which includes additional changes.

For the stable distribution (stretch), these problems have been fixed in version 9.26~dfsg-0+deb9u1.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript