Slackware: 2019-092-01: ghostscript Security Update
Summary
Here are the details from the Slackware 14.2 ChangeLog: patches/packages/ghostscript-9.26-i586-1_slack14.2.txz: Upgraded. Fixes security issues: A specially crafted PostScript file could have access to the file system outside of the constrains imposed by -dSAFER. Transient procedures can allow access to system operators, leading to remote code execution. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116 (* Security fix *)
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/ghostscript-9.26-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/ghostscript-9.26-x86_64-1_slack14.2.txz
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 14.2 package:
f4758b3fb8b489c5d952cb4adead3906 ghostscript-9.26-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
7f80a24e354260abcfd57d71f1100e96 ghostscript-9.26-x86_64-1_slack14.2.txz
Slackware -current package:
d3088e1ae4aeb2fb7747991ec40870bb ap/ghostscript-9.26-i586-2.txz
Slackware x86_64 -current package:
80fed94357eb57a9c3877f39b8d2af50 ap/ghostscript-9.26-x86_64-2.txz
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg ghostscript-9.26-i586-1_slack14.2.txz