openSUSE Security Update: ghostscript security update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0425-2 Rating: important References: #559122 #605043 #608071 Cross-References: CVE-2009-4270 CVE-2009-4897 CVE-2010-1628 CVE-2010-1869 CVE-2010-2055 Affected Products: openSUSE 11.2 openSUSE 11.1 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: Specially crafted postscript (.ps) files could cause buffer overflows in ghostscript that could potentially be exploited to execute arbitrary code (CVE-2010-1628, CVE-2010-1869, CVE-2009-4270) ghostscript by default read some initialization files from the current working directory. Local attackers could potentially exploit that to have other users execute arbitrary commands by placing such files e.g. in /tmp (CVE-2010-2055). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.2: zypper in -t patch ghostscript-devel-2706 - openSUSE 11.1: zypper in -t patch ghostscript-devel-2706 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.2 (i586 src x86_64): ghostscript-library-8.64-6.3.1 - openSUSE 11.2 (i586 x86_64): ghostscript-devel-8.64-6.3.1 ghostscript-fonts-other-8.64-6.3.1 ghostscript-fonts-rus-8.64-6.3.1 ghostscript-fonts-std-8.64-6.3.1 ghostscript-ijs-devel-8.64-6.3.1 ghostscript-omni-8.64-6.3.1 ghostscript-x11-8.64-6.3.1 libgimpprint-4.2.7-6.3.1 libgimpprint-devel-4.2.7-6.3.1 - openSUSE 11.1 (i586 ppc src x86_64): ghostscript-library-8.62-31.44.1 - openSUSE 11.1 (i586 ppc x86_64): ghostscript-devel-8.62-31.44.1 ghostscript-fonts-other-8.62-31.44.1 ghostscript-fonts-rus-8.62-31.44.1 ghostscript-fonts-std-8.62-31.44.1 ghostscript-ijs-devel-8.62-31.44.1 ghostscript-omni-8.62-31.44.1 ghostscript-x11-8.62-31.44.1 libgimpprint-4.2.7-31.44.1 libgimpprint-devel-4.2.7-31.44.1 References: http://support.novell.com/security/cve/CVE-2009-4270.html http://support.novell.com/security/cve/CVE-2009-4897.html http://support.novell.com/security/cve/CVE-2010-1628.html http://support.novell.com/security/cve/CVE-2010-1869.html http://support.novell.com/security/cve/CVE-2010-2055.html https://bugzilla.novell.com/559122 https://bugzilla.novell.com/605043 https://bugzilla.novell.com/608071