ghostscript 8.64~dfsg-1.1 source package in Debian

Changelog

ghostscript (8.64~dfsg-1.1) unstable; urgency=high


  * Non-maintainer upload by the Security Team.
  * This update fixes various security issues:
    - CVE-2009-0792: multiple integer overflows in the icc library
      can cause a heap-based buffer overflow possibly leading to arbitray
      code execution.
    - CVE-2009-0584/CVE-2009-0583: Multiple integer overflows causing an
      application crash or possibly arbitrary code execution.
    - CVE-2009-0196: heap-based buffer overflow in big2_decode_symbol_dict()
      leading to arbitrary code execution via a crafted JBIG2 symbol
      dictionary segment.
      .
      (Closes: #524915, #522416, #524803)

 -- Nico Golde <email address hidden>  Wed, 22 Apr 2009 00:19:51 +0200

Upload details

Uploaded by:
Masayuki Hatta
Uploaded to:
Sid
Original maintainer:
Masayuki Hatta
Architectures:
any
Section:
text
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
ghostscript_8.64~dfsg-1.1.dsc 1.6 KiB 0d4bae2b02705659308f06527343ea8c269be555de6d52410201f9da3a2caf7b
ghostscript_8.64~dfsg.orig.tar.gz 11.4 MiB cc856d33cb781cdc3383b8eb4e0f390997f8359fe144a906b84297b5d377f03d
ghostscript_8.64~dfsg-1.1.diff.gz 83.8 KiB 4828b4680c4d897c06ed8d895004cb7eae50bd5a0d2970a17c34f197e65d86e3

No changes file available.

Binary packages built by this source