Format: 1.8 Date: Wed, 06 Jan 2021 12:44:08 -0500 Source: ghostscript Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg Architecture: i386 Version: 9.26~dfsg+0-0ubuntu0.16.04.14 Distribution: xenial Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Marc Deslauriers Description: ghostscript - interpreter for the PostScript language and for PDF ghostscript-dbg - interpreter for the PostScript language and for PDF - Debug symbo ghostscript-doc - interpreter for the PostScript language and for PDF - Documentati ghostscript-x - interpreter for the PostScript language and for PDF - X11 support libgs-dev - interpreter for the PostScript language and for PDF - Development libgs9 - interpreter for the PostScript language and for PDF - Library libgs9-common - interpreter for the PostScript language and for PDF - common file Changes: ghostscript (9.26~dfsg+0-0ubuntu0.16.04.14) xenial-security; urgency=medium . * SECURITY UPDATE: integer overflow in opj_t1_encode_cblks - debian/patches/CVE-2018-5727.patch: fix UBSAN signed integer overflow in openjpeg/src/lib/openjp2/t1.c. - CVE-2018-5727 * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor - debian/patches/CVE-2020-6851.patch: reject images whose coordinates are beyond INT_MAX in openjpeg/src/lib/openjp2/j2k.c. - CVE-2020-6851 * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor - debian/patches/CVE-2020-8112.patch: avoid integer overflow in openjpeg/src/lib/openjp2/tcd.c. - CVE-2020-8112 * SECURITY UPDATE: heap-buffer-overflow - debian/patches/CVE-2020-27814-1.patch: grow buffer size in openjpeg/src/lib/openjp2/tcd.c. - debian/patches/CVE-2020-27814-2.patch: grow it again - debian/patches/CVE-2020-27814-3.patch: and some more - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!! - CVE-2020-27814 * SECURITY UPDATE: global-buffer-overflow - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on irreversible conversion when too many decomposition levels are specified in openjpeg/src/lib/openjp2/dwt.c. - CVE-2020-27824 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27841.patch: add extra checks to openjpeg/src/lib/openjp2/pi.c, openjpeg/src/lib/openjp2/pi.h, openjpeg/src/lib/openjp2/t2.c. - CVE-2020-27841 * SECURITY UPDATE: null pointer dereference - debian/patches/CVE-2020-27842.patch: add check to openjpeg/src/lib/openjp2/t2.c. - CVE-2020-27842 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27843.patch: add check to openjpeg/src/lib/openjp2/t2.c. - CVE-2020-27843 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27845.patch: add extra checks to openjpeg/src/lib/openjp2/pi.c. - CVE-2020-27845 Checksums-Sha1: 9ab576e66eacc391d6ae776b01059a002a6b84cb 5723046 ghostscript-dbg_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 6878efccdb457f380631269287c20d35026df3ef 1008 ghostscript-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 2d9603bc40442ec1764fc377ee69950e3c7f1d26 944 ghostscript-x-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 54fbcb9eb83e78a4f5ff8d0307a8392e9ee6611f 44736 ghostscript-x_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb b82aba18eb934f3ede7b4ff6a59f2917d5e3716e 47298 ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 0488081a4d09ec18d0232689898516a6469c5d10 1004 libgs-dev-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb bfb0a7f49f0ceb86ad541b73c0e9288b0c0b79f2 25312 libgs-dev_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb ba83ad7a6c0fc529f5ea6b2562fdbcdad0d96abd 986 libgs9-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 22b7e3bf1057f0a1f9999eeaece810163505b458 2379218 libgs9_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb Checksums-Sha256: b4f864984adb67aacc532f21aa1637ccf32d47bb700f4eb92446ba71683afdf3 5723046 ghostscript-dbg_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 78b9c87abcb4dedecca9efd77fd0639e637e0304c4ca0a99ba117ef5bf56fdde 1008 ghostscript-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb fc8669080570a9fd1dfa914c42ae11fa783413ab2f5225d8ff1f5f5376e8b685 944 ghostscript-x-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb ca125466e64d4e34eff968d5ba48826d9dae34f00291fe92eec5de177232312b 44736 ghostscript-x_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 97c437b0120d6f9ce1ecfbb01057d48721e53894f1a7b1443f9bc55588674477 47298 ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 5fa0daff333ebcf6f70f15177ef2b14fc33db4267fb33121d01ded1abaf5582d 1004 libgs-dev-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb dd24d089a4181d71639e6235210595ecb2d286b56aafdd31afc0ebc8f7937e55 25312 libgs-dev_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb d81cf7bbda8c49c57f0e0e6dc69e69c17e2a2d9ab31494ae1c7c87e846db1d90 986 libgs9-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 94431de3771cc0a1328c1096fc52b7c3ffc157967359d4242c11494cc76725bc 2379218 libgs9_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb Files: b8c9066e5900aa3b033ff77b558ab698 5723046 debug extra ghostscript-dbg_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 81e614ad2417ca0410fbfbe647816cfa 1008 text extra ghostscript-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 4378480367127d2c8ee30305fa652956 944 text extra ghostscript-x-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 612af4ac72b7d80d76457dbed8bdbeac 44736 text optional ghostscript-x_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 4c3c266858e6d2efe7cc6864774bcba8 47298 text optional ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb 4364d935e4c1931f37820c927924d609 1004 libdevel extra libgs-dev-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb ecc30b97a4f6d63661364436b1f59358 25312 libdevel optional libgs-dev_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb b585614027ad1675a6195409672e30ed 986 libs extra libgs9-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_i386.ddeb 2d12062311ed1323c7d2eda990d8d12f 2379218 libs optional libgs9_9.26~dfsg+0-0ubuntu0.16.04.14_i386.deb Original-Maintainer: Debian Printing Team