Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4054 to the following vulnerability: The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043. References: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054 [2] http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html [3] http://www.kb.cert.org/vuls/id/538191 Upstream bug report: [4] http://bugs.ghostscript.com/show_bug.cgi?id=691043
This issue affects the versions of the ghostscript package, as shipped with Red Hat Enterprise Linux 3, 4, and 5. -- This issue affects the version of the ghostscript package, as shipped with Fedora release of 12. This issue does not affect the version of the ghostscript package, as shipped with Fedora release of 13 (updated ghostscript package is already present in Fedora 13 -testing repository and will shortly reach -stable branch).
Created ghostscript tracking bugs for this issue Affects: fedora-12 [bug 647405]
Looks to me like Fedora 12 has not been affected since February, which is when it was updated to 8.71.
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2012:0096 https://rhn.redhat.com/errata/RHSA-2012-0096.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:0095 https://rhn.redhat.com/errata/RHSA-2012-0095.html
Statement: (none)