[ubuntu/oracular-proposed] ghostscript 10.02.1~dfsg1-0ubuntu8 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Wed Jul 10 18:02:17 UTC 2024


ghostscript (10.02.1~dfsg1-0ubuntu8) oracular; urgency=medium

  [ Marc Deslauriers }
  * SECURITY UPDATE: stack-based buffer overflow via long PDF filter name
    - debian/patches/CVE-2024-29506.patch: don't allow PDF files with bad
      Filters to overflow the debug buffer in pdf/pdf_file.c.
    - CVE-2024-29506
  * SECURITY UPDATE: stack-based buffer overflows
    - debian/patches/CVE-2024-29507.patch: bounds checks when using CIDFont
      related params in pdf/pdf_font.c, pdf/pdf_warnings.h.
    - CVE-2024-29507
  * SECURITY UPDATE: heap-based pointer disclosure via constructed BaseFont
    name
    - debian/patches/CVE-2024-29508.patch: review printing of pointers in
      base/gsfont.c, base/gsicc_cache.c, base/gsmalloc.c, base/gxclmem.c,
      base/gxcpath.c, base/gxpath.c, base/szlibc.c, devices/gdevupd.c,
      devices/vector/gdevpdtb.c, psi/ialloc.c, psi/igc.c, psi/igcstr.c,
      psi/iinit.c, psi/imainarg.c, psi/isave.c, psi/iutil.c.
    - debian/patches/CVE-2024-29508-2.patch: fix compiler warning in
      optimised build in base/gsicc_cache.c.
    - debian/patches/CVE-2024-29508-3.patch: remove extra arguments in
      devices/gdevupd.c.
    - CVE-2024-29508
  * SECURITY UPDATE: heap-based overflow via PDFPassword with null byte
    - debian/patches/CVE-2024-29509.patch: don't use strlen on passwords in
      pdf/pdf_sec.c.
    - CVE-2024-29509
  * SECURITY UPDATE: directory traversal issue via OCRLanguage
    - debian/patches/CVE-2024-29511.patch: reject OCRLanguage changes after
      SAFER enabled in devices/gdevocr.c, devices/gdevpdfocr.c,
      devices/vector/gdevpdfp.c.
    - CVE-2024-29511

  [ Chris Kim ]
  * SECURITY UPDATE: Arbitrary code execution via uniprint device
    - debian/patches/CVE-2024-29510.patch: Prevent changes to uniprint device
      argument strings after SAFER is activated in gdevupd.c.
    - CVE-2024-29510
  * SECURITY UPDATE: Path traversal and arbitrary code execution via improperly
    checked path arguments
    - debian/patches/CVE-2024-33869-part1.patch: Check that a current working
      directory specifier is valid before stripping it from gpmisc.c.
    - debian/patches/CVE-2024-33869-part2.patch: Check that a current working
      directory specifier is valid before stripping it from gpmisc.c.
    - CVE-2024-33869
  * SECURITY UPDATE: Path traversal via improperly checked path arguments
    - debian/patches/CVE-2024-33870.patch: Add a check for parent directory
      prefixes when handling relative paths in gpmisc.c.
    - CVE-2024-33870
  * SECURITY UPDATE: Arbitrary code execution via custom driver library
    - debian/patches/CVE-2024-33871.patch: Prevent changes to parameter that
      specifies the names of dynamic libraries to be loaded by the opvp/oprp
      device in gdevopvp.c
    - CVE-2024-33871

Date: Wed, 10 Jul 2024 13:28:20 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/ghostscript/10.02.1~dfsg1-0ubuntu8
-------------- next part --------------
Format: 1.8
Date: Wed, 10 Jul 2024 13:28:20 -0400
Source: ghostscript
Built-For-Profiles: noudeb
Architecture: source
Version: 10.02.1~dfsg1-0ubuntu8
Distribution: oracular
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Changes:
 ghostscript (10.02.1~dfsg1-0ubuntu8) oracular; urgency=medium
 .
   [ Marc Deslauriers }
   * SECURITY UPDATE: stack-based buffer overflow via long PDF filter name
     - debian/patches/CVE-2024-29506.patch: don't allow PDF files with bad
       Filters to overflow the debug buffer in pdf/pdf_file.c.
     - CVE-2024-29506
   * SECURITY UPDATE: stack-based buffer overflows
     - debian/patches/CVE-2024-29507.patch: bounds checks when using CIDFont
       related params in pdf/pdf_font.c, pdf/pdf_warnings.h.
     - CVE-2024-29507
   * SECURITY UPDATE: heap-based pointer disclosure via constructed BaseFont
     name
     - debian/patches/CVE-2024-29508.patch: review printing of pointers in
       base/gsfont.c, base/gsicc_cache.c, base/gsmalloc.c, base/gxclmem.c,
       base/gxcpath.c, base/gxpath.c, base/szlibc.c, devices/gdevupd.c,
       devices/vector/gdevpdtb.c, psi/ialloc.c, psi/igc.c, psi/igcstr.c,
       psi/iinit.c, psi/imainarg.c, psi/isave.c, psi/iutil.c.
     - debian/patches/CVE-2024-29508-2.patch: fix compiler warning in
       optimised build in base/gsicc_cache.c.
     - debian/patches/CVE-2024-29508-3.patch: remove extra arguments in
       devices/gdevupd.c.
     - CVE-2024-29508
   * SECURITY UPDATE: heap-based overflow via PDFPassword with null byte
     - debian/patches/CVE-2024-29509.patch: don't use strlen on passwords in
       pdf/pdf_sec.c.
     - CVE-2024-29509
   * SECURITY UPDATE: directory traversal issue via OCRLanguage
     - debian/patches/CVE-2024-29511.patch: reject OCRLanguage changes after
       SAFER enabled in devices/gdevocr.c, devices/gdevpdfocr.c,
       devices/vector/gdevpdfp.c.
     - CVE-2024-29511
 .
   [ Chris Kim ]
   * SECURITY UPDATE: Arbitrary code execution via uniprint device
     - debian/patches/CVE-2024-29510.patch: Prevent changes to uniprint device
       argument strings after SAFER is activated in gdevupd.c.
     - CVE-2024-29510
   * SECURITY UPDATE: Path traversal and arbitrary code execution via improperly
     checked path arguments
     - debian/patches/CVE-2024-33869-part1.patch: Check that a current working
       directory specifier is valid before stripping it from gpmisc.c.
     - debian/patches/CVE-2024-33869-part2.patch: Check that a current working
       directory specifier is valid before stripping it from gpmisc.c.
     - CVE-2024-33869
   * SECURITY UPDATE: Path traversal via improperly checked path arguments
     - debian/patches/CVE-2024-33870.patch: Add a check for parent directory
       prefixes when handling relative paths in gpmisc.c.
     - CVE-2024-33870
   * SECURITY UPDATE: Arbitrary code execution via custom driver library
     - debian/patches/CVE-2024-33871.patch: Prevent changes to parameter that
       specifies the names of dynamic libraries to be loaded by the opvp/oprp
       device in gdevopvp.c
     - CVE-2024-33871
Checksums-Sha1:
 7da7da50413b2d37d1ace42668d3e294f810b1ec 2844 ghostscript_10.02.1~dfsg1-0ubuntu8.dsc
 4483a95675c14354cafa508fdf2e0c37c10cfe0b 95408 ghostscript_10.02.1~dfsg1-0ubuntu8.debian.tar.xz
 74a1ae080f21b34ddc92b281d54d2a4b4e3949e8 16639 ghostscript_10.02.1~dfsg1-0ubuntu8_source.buildinfo
Checksums-Sha256:
 720db60d88aecabce241f771b3ef9edf269235035a5eacad60e3f617ab85e435 2844 ghostscript_10.02.1~dfsg1-0ubuntu8.dsc
 35e256da6180774206e29dafa84323d724faeb15caa6102e135a289ba22f525b 95408 ghostscript_10.02.1~dfsg1-0ubuntu8.debian.tar.xz
 eb6e706d6ad79b3bb45c2d929650e160fb0d4957f673c02a6b281f66147b011b 16639 ghostscript_10.02.1~dfsg1-0ubuntu8_source.buildinfo
Files:
 fa5432debb10e6f3516341b47bef22f2 2844 text optional ghostscript_10.02.1~dfsg1-0ubuntu8.dsc
 8423fe14805191d9841032c1bd13c5a6 95408 text optional ghostscript_10.02.1~dfsg1-0ubuntu8.debian.tar.xz
 877b6380cae88cff56fbe443f1cb5441 16639 text optional ghostscript_10.02.1~dfsg1-0ubuntu8_source.buildinfo
Original-Maintainer: Debian Printing Team <debian-printing at lists.debian.org>


More information about the oracular-changes mailing list