Package "ghostscript-x"
  
    
    
        | Name: | 
        ghostscript-x
            
         | 
    
    
         Description: | 
        
             interpreter for the PostScript language and for PDF - X11 support 
         | 
    
    
        | Latest version: | 
        9.26~dfsg+0-0ubuntu0.18.04.18 | 
    
    
        | Release: | 
        bionic (18.04) | 
    
    
        | Level: | 
        security | 
    
    
        | Repository: | 
        main | 
    
         
            | Head package: | 
            ghostscript | 
         
        
            | Homepage: | 
            https://www.ghostscript.com/ | 
        
    
   
  
  
 
Links
    Download "ghostscript-x"
    
Other versions of "ghostscript-x" in Bionic
    
Changelog
    
    
    
        
        
    
    
        | 
               ghostscript (9.26~dfsg+0-0ubuntu0.18.04.18) bionic-security; urgency=medium 
  * SECURITY UPDATE: Buffer Overflow
     - debian/patches/CVE-2023-28879.patch: add check to make sure that the
       buffer has space for two characters in s_xBCPE_process() in base/sbcp.c.
     - CVE-2023-28879 
 -- Rodrigo Figueiredo Zaiden <email address hidden>  Thu, 13 Apr 2023 10:09:22 -0300 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2023-28879 | 
                In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               ghostscript (9.26~dfsg+0-0ubuntu0.18.04.17) bionic-security; urgency=medium 
  * SECURITY UPDATE: heap-based buffer overflow in lp8000_print_page()
     - debian/patches/CVE-2020-27792.patch: fixed output buffer size worst
       case in devices/gdevlp8k.c.
     - CVE-2020-27792 
 -- Marc Deslauriers <email address hidden>  Mon, 26 Sep 2022 10:43:27 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2020-27792 | 
                A heap-based buffer over write vulnerability was found in GhostScript's lp8000_print_page() function in gdevlp8k.c file. An attacker could trick a us | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               ghostscript (9.26~dfsg+0-0ubuntu0.18.04.16) bionic-security; urgency=medium 
  * SECURITY UPDATE: old code execution issue
     - debian/patches/CVE-2019-25059-1.patch: undef .completefont in
       Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
       Resource/Init/gs_ttf.ps.
     - debian/patches/CVE-2019-25059-2.patch: undef .origdefinefont,
       .origundefinefont, .origfindfont in Resource/Init/gs_init.ps,
       Resource/Init/gs_res.ps.
     - CVE-2019-25059 
 -- Marc Deslauriers <email address hidden>  Wed, 27 Apr 2022 08:27:55 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2019-25059 | 
                Artifex Ghostscript through 9.26 mishandles .completefont. NOTE: this issue exists because of an incomplete fix for CVE-2019-3839. | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               ghostscript (9.26~dfsg+0-0ubuntu0.18.04.15) bionic-security; urgency=medium 
  * SECURITY UPDATE: use-after-free in sampled_data_sample
     - debian/patches/CVE-2021-45944.patch: check stack limits after
       function evaluation in psi/zfsample.c.
     - CVE-2021-45944
   * SECURITY UPDATE: heap-based buffer overflow in sampled_data_finish
     - debian/patches/CVE-2021-45949.patch: fix op stack management in
       psi/zfsample.c.
     - CVE-2021-45949 
 -- Marc Deslauriers <email address hidden>  Tue, 11 Jan 2022 09:22:40 -0500 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2021-45944 | 
                Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp). | 
                 
                
                | CVE-2021-45949 | 
                Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp). | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               ghostscript (9.26~dfsg+0-0ubuntu0.18.04.14) bionic-security; urgency=medium 
  * SECURITY UPDATE: integer overflow in opj_t1_encode_cblks
     - debian/patches/CVE-2018-5727.patch: fix UBSAN signed integer overflow
       in openjpeg/src/lib/openjp2/t1.c.
     - CVE-2018-5727
   * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor
     - debian/patches/CVE-2020-6851.patch: reject images whose
       coordinates are beyond INT_MAX in openjpeg/src/lib/openjp2/j2k.c.
     - CVE-2020-6851
   * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor
     - debian/patches/CVE-2020-8112.patch: avoid integer overflow in
       openjpeg/src/lib/openjp2/tcd.c.
     - CVE-2020-8112
   * SECURITY UPDATE: heap-buffer-overflow
     - debian/patches/CVE-2020-27814-1.patch: grow buffer size in
       openjpeg/src/lib/openjp2/tcd.c.
     - debian/patches/CVE-2020-27814-2.patch: grow it again
     - debian/patches/CVE-2020-27814-3.patch: and some more
     - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!!
     - CVE-2020-27814
   * SECURITY UPDATE: global-buffer-overflow
     - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on
       irreversible conversion when too many decomposition levels are
       specified in openjpeg/src/lib/openjp2/dwt.c.
     - CVE-2020-27824
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2020-27841.patch: add extra checks to
       openjpeg/src/lib/openjp2/pi.c, openjpeg/src/lib/openjp2/pi.h,
       openjpeg/src/lib/openjp2/t2.c.
     - CVE-2020-27841
   * SECURITY UPDATE: null pointer dereference
     - debian/patches/CVE-2020-27842.patch: add check to
       openjpeg/src/lib/openjp2/t2.c.
     - CVE-2020-27842
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2020-27843.patch: add check to
       openjpeg/src/lib/openjp2/t2.c.
     - CVE-2020-27843
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2020-27845.patch: add extra checks to
       openjpeg/src/lib/openjp2/pi.c.
     - CVE-2020-27845 
 -- Marc Deslauriers <email address hidden>  Wed, 06 Jan 2021 12:44:08 -0500 
         | 
    
    
        
        
            
            
                
                | CVE-2018-5727 | 
                In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage thi | 
                 
                
                | CVE-2020-6851 | 
                OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimen | 
                 
                
                | CVE-2020-8112 | 
                opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different | 
                 
                
                | CVE-2020-27824 | 
                global-buffer-overflow read in lib-openjp2 | 
                 
                
                | CVE-2020-27841 | 
                There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by t | 
                 
                
                | CVE-2020-27842 | 
                There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg coul | 
                 
                
                | CVE-2020-27843 | 
                A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encodin | 
                 
                
                | CVE-2020-27845 | 
                There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conver | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates