Package "ghostscript"
  
    
    
        | Name: | ghostscript | 
    
        | Description:
 | interpreter for the PostScript language and for PDF | 
    
        | Latest version: | 9.26~dfsg+0-0ubuntu0.18.04.18 | 
    
        | Release: | bionic (18.04) | 
    
        | Level: | security | 
    
        | Repository: | main | 
        
            | Homepage: | https://www.ghostscript.com/ | 
    
   
  
  
 
Links
    Download "ghostscript"
    
Other versions of "ghostscript" in Bionic
    
Packages in group
Deleted packages are displayed in grey.
Changelog
    
    
    
        
        
    
    
        |   ghostscript (9.26~dfsg+0-0ubuntu0.18.04.18) bionic-security; urgency=medium   * SECURITY UPDATE: Buffer Overflow
- debian/patches/CVE-2023-28879.patch: add check to make sure that the
 buffer has space for two characters in s_xBCPE_process() in base/sbcp.c.
 - CVE-2023-28879
  -- Rodrigo Figueiredo Zaiden <email address hidden>  Thu, 13 Apr 2023 10:09:22 -0300 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2023-28879 | In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in |  | 
    
    
    
    
    
        
        
    
    
        |   ghostscript (9.26~dfsg+0-0ubuntu0.18.04.17) bionic-security; urgency=medium   * SECURITY UPDATE: heap-based buffer overflow in lp8000_print_page()
- debian/patches/CVE-2020-27792.patch: fixed output buffer size worst
 case in devices/gdevlp8k.c.
 - CVE-2020-27792
  -- Marc Deslauriers <email address hidden>  Mon, 26 Sep 2022 10:43:27 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2020-27792 | A heap-based buffer over write vulnerability was found in GhostScript's lp8000_print_page() function in gdevlp8k.c file. An attacker could trick a us |  | 
    
    
    
    
    
        
        
    
    
        |   ghostscript (9.26~dfsg+0-0ubuntu0.18.04.16) bionic-security; urgency=medium   * SECURITY UPDATE: old code execution issue
- debian/patches/CVE-2019-25059-1.patch: undef .completefont in
 Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
 Resource/Init/gs_ttf.ps.
 - debian/patches/CVE-2019-25059-2.patch: undef .origdefinefont,
 .origundefinefont, .origfindfont in Resource/Init/gs_init.ps,
 Resource/Init/gs_res.ps.
 - CVE-2019-25059
  -- Marc Deslauriers <email address hidden>  Wed, 27 Apr 2022 08:27:55 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2019-25059 | Artifex Ghostscript through 9.26 mishandles .completefont. NOTE: this issue exists because of an incomplete fix for CVE-2019-3839. |  | 
    
    
    
    
    
        
        
    
    
        |   ghostscript (9.26~dfsg+0-0ubuntu0.18.04.15) bionic-security; urgency=medium   * SECURITY UPDATE: use-after-free in sampled_data_sample
- debian/patches/CVE-2021-45944.patch: check stack limits after
 function evaluation in psi/zfsample.c.
 - CVE-2021-45944
 * SECURITY UPDATE: heap-based buffer overflow in sampled_data_finish
 - debian/patches/CVE-2021-45949.patch: fix op stack management in
 psi/zfsample.c.
 - CVE-2021-45949
  -- Marc Deslauriers <email address hidden>  Tue, 11 Jan 2022 09:22:40 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2021-45944 | Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp). |  
                | CVE-2021-45949 | Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp). |  | 
    
    
    
    
    
        
        
    
    
        |   ghostscript (9.26~dfsg+0-0ubuntu0.18.04.14) bionic-security; urgency=medium   * SECURITY UPDATE: integer overflow in opj_t1_encode_cblks
- debian/patches/CVE-2018-5727.patch: fix UBSAN signed integer overflow
 in openjpeg/src/lib/openjp2/t1.c.
 - CVE-2018-5727
 * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor
 - debian/patches/CVE-2020-6851.patch: reject images whose
 coordinates are beyond INT_MAX in openjpeg/src/lib/openjp2/j2k.c.
 - CVE-2020-6851
 * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor
 - debian/patches/CVE-2020-8112.patch: avoid integer overflow in
 openjpeg/src/lib/openjp2/tcd.c.
 - CVE-2020-8112
 * SECURITY UPDATE: heap-buffer-overflow
 - debian/patches/CVE-2020-27814-1.patch: grow buffer size in
 openjpeg/src/lib/openjp2/tcd.c.
 - debian/patches/CVE-2020-27814-2.patch: grow it again
 - debian/patches/CVE-2020-27814-3.patch: and some more
 - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!!
 - CVE-2020-27814
 * SECURITY UPDATE: global-buffer-overflow
 - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on
 irreversible conversion when too many decomposition levels are
 specified in openjpeg/src/lib/openjp2/dwt.c.
 - CVE-2020-27824
 * SECURITY UPDATE: out-of-bounds read
 - debian/patches/CVE-2020-27841.patch: add extra checks to
 openjpeg/src/lib/openjp2/pi.c, openjpeg/src/lib/openjp2/pi.h,
 openjpeg/src/lib/openjp2/t2.c.
 - CVE-2020-27841
 * SECURITY UPDATE: null pointer dereference
 - debian/patches/CVE-2020-27842.patch: add check to
 openjpeg/src/lib/openjp2/t2.c.
 - CVE-2020-27842
 * SECURITY UPDATE: out-of-bounds read
 - debian/patches/CVE-2020-27843.patch: add check to
 openjpeg/src/lib/openjp2/t2.c.
 - CVE-2020-27843
 * SECURITY UPDATE: out-of-bounds read
 - debian/patches/CVE-2020-27845.patch: add extra checks to
 openjpeg/src/lib/openjp2/pi.c.
 - CVE-2020-27845
  -- Marc Deslauriers <email address hidden>  Wed, 06 Jan 2021 12:44:08 -0500 | 
    
        
        | 
                
                | CVE-2018-5727 | In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage thi |  
                | CVE-2020-6851 | OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimen |  
                | CVE-2020-8112 | opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different |  
                | CVE-2020-27824 | global-buffer-overflow read in lib-openjp2 |  
                | CVE-2020-27841 | There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by t |  
                | CVE-2020-27842 | There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg coul |  
                | CVE-2020-27843 | A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encodin |  
                | CVE-2020-27845 | There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conver |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates