Format: 1.8 Date: Wed, 06 Jan 2021 12:44:08 -0500 Source: ghostscript Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg Architecture: ppc64el Version: 9.26~dfsg+0-0ubuntu0.16.04.14 Distribution: xenial Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Marc Deslauriers Description: ghostscript - interpreter for the PostScript language and for PDF ghostscript-dbg - interpreter for the PostScript language and for PDF - Debug symbo ghostscript-doc - interpreter for the PostScript language and for PDF - Documentati ghostscript-x - interpreter for the PostScript language and for PDF - X11 support libgs-dev - interpreter for the PostScript language and for PDF - Development libgs9 - interpreter for the PostScript language and for PDF - Library libgs9-common - interpreter for the PostScript language and for PDF - common file Changes: ghostscript (9.26~dfsg+0-0ubuntu0.16.04.14) xenial-security; urgency=medium . * SECURITY UPDATE: integer overflow in opj_t1_encode_cblks - debian/patches/CVE-2018-5727.patch: fix UBSAN signed integer overflow in openjpeg/src/lib/openjp2/t1.c. - CVE-2018-5727 * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor - debian/patches/CVE-2020-6851.patch: reject images whose coordinates are beyond INT_MAX in openjpeg/src/lib/openjp2/j2k.c. - CVE-2020-6851 * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor - debian/patches/CVE-2020-8112.patch: avoid integer overflow in openjpeg/src/lib/openjp2/tcd.c. - CVE-2020-8112 * SECURITY UPDATE: heap-buffer-overflow - debian/patches/CVE-2020-27814-1.patch: grow buffer size in openjpeg/src/lib/openjp2/tcd.c. - debian/patches/CVE-2020-27814-2.patch: grow it again - debian/patches/CVE-2020-27814-3.patch: and some more - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!! - CVE-2020-27814 * SECURITY UPDATE: global-buffer-overflow - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on irreversible conversion when too many decomposition levels are specified in openjpeg/src/lib/openjp2/dwt.c. - CVE-2020-27824 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27841.patch: add extra checks to openjpeg/src/lib/openjp2/pi.c, openjpeg/src/lib/openjp2/pi.h, openjpeg/src/lib/openjp2/t2.c. - CVE-2020-27841 * SECURITY UPDATE: null pointer dereference - debian/patches/CVE-2020-27842.patch: add check to openjpeg/src/lib/openjp2/t2.c. - CVE-2020-27842 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27843.patch: add check to openjpeg/src/lib/openjp2/t2.c. - CVE-2020-27843 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27845.patch: add extra checks to openjpeg/src/lib/openjp2/pi.c. - CVE-2020-27845 Checksums-Sha1: ca7227b400d389afa60594c2ca72f66aa665ceda 6961118 ghostscript-dbg_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb 8a14714eef3136921bb5d1953281b00e36a45801 1012 ghostscript-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 615072f016fea881b15dbcc6adbffa5aa4f65d11 944 ghostscript-x-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb a07a99b230a96ea9c6072913c91be4ca5e074add 43262 ghostscript-x_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb de1894ad7c0a6054644d77511dc116c5cce0252b 47170 ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb d84937bf1f5d18b9ddbdd83b50b9c5730a89c989 1004 libgs-dev-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 7645c8079a2e07942c0a7f4eced7989e56734235 25314 libgs-dev_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb d75af28dd82debe52d050d4baa081f36b8658a27 988 libgs9-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb b58c98f7654fa634d81db4c0d68975ca369ba0e1 2488568 libgs9_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb Checksums-Sha256: b2f600f453d4b637356bef43f11dd8cc456cc0bfa8d425f433f1c528afe15f5b 6961118 ghostscript-dbg_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb 1ad2b450985348023ae58bd88c7ff21c9f1babf9c3e9ec49275b6463408265a7 1012 ghostscript-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 9c4baf325f0c0e788239cd767653bcc214e05221352dfc42bc4f72ca5fede8bc 944 ghostscript-x-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb f1452b6edffa901e182077341e8c688bea5bea4e112927476ca27ef6ede23d78 43262 ghostscript-x_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb 050f86f8b2a994f817442e1b52891ee9479174212b4d95a9b800dfb8df25ce9c 47170 ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb 68d5268739920e370b8b732c7d303fd8de80d31f8844bc14563fefd683f3dade 1004 libgs-dev-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 10bef15ac5ab25a3366f36afd23e933e665a16ce959cbb750dcb11607412464b 25314 libgs-dev_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb d9ee526a88e8eeb4afb0b4a97641a8f14e2331c313e07c008bb9b93fba5943ac 988 libgs9-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 99311b93d76f8179807546e31b35e7c791bc99b98fd3130ec87a6bfc7284998a 2488568 libgs9_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb Files: 6b58ada1381afa7f93d276e7f334c28a 6961118 debug extra ghostscript-dbg_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb 5c70f87edf8555e01d30c2136cac2116 1012 text extra ghostscript-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 53c742d1b2016341cc9375bfaea8f6d2 944 text extra ghostscript-x-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 1adf50e0cc504690af4cc5095a4fd480 43262 text optional ghostscript-x_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb feb897d2c4cc92b7d4cffdd2c2e7d769 47170 text optional ghostscript_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb 19db824b62c33c3d4e3a544c2f06ee08 1004 libdevel extra libgs-dev-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb e049894ea9f0127227cda98c794e70ad 25314 libdevel optional libgs-dev_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb b3bc805910ff7b513532c09b83a0d116 988 libs extra libgs9-dbgsym_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.ddeb 6ce21ddea312a2dfd19c7bd7cdfb0f01 2488568 libs optional libgs9_9.26~dfsg+0-0ubuntu0.16.04.14_ppc64el.deb Original-Maintainer: Debian Printing Team