UbuntuUpdates.org

Package "libgs-dev"

Name: libgs-dev

Description:

interpreter for the PostScript language and for PDF - Development Files

Latest version: 9.50~dfsg-5ubuntu4.14
Release: focal (20.04)
Level: security
Repository: main
Head package: ghostscript
Homepage: https://www.ghostscript.com/

Links


Download "libgs-dev"


Other versions of "libgs-dev" in Focal

Repository Area Version
base main 9.50~dfsg-5ubuntu4
updates main 9.50~dfsg-5ubuntu4.14

Changelog

Version: 9.50~dfsg-5ubuntu4.9 2023-08-17 14:06:57 UTC

  ghostscript (9.50~dfsg-5ubuntu4.9) focal-security; urgency=medium

  * SECURITY UPDATE: buffer overflow
    - debian/patches/CVE-2023-38559.patch: bounds check the buffer prior to
      deferencing the pointer in devn_pcx_write_rle() in base/gdevdevn.c.
    - CVE-2023-38559

 -- Allen Huang <email address hidden> Tue, 15 Aug 2023 11:17:37 +0100

Source diff to previous version
CVE-2023-38559 A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a den

Version: 9.50~dfsg-5ubuntu4.8 2023-07-10 15:06:58 UTC

  ghostscript (9.50~dfsg-5ubuntu4.8) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect permission validation for pipe devices
    - debian/patches/CVE-2023-36664-pre1.patch: improve handling of current
      directory permissions in base/gpmisc.c.
    - debian/patches/CVE-2023-36664-pre2.patch: fix gp_file allocations to
      use thread_safe_memory in base/gpmisc.c.
    - debian/patches/CVE-2023-36664-1.patch: don't reduce pipe file names
      for permission validation in base/gpmisc.c, base/gslibctx.c.
    - debian/patches/CVE-2023-36664-2.patch: fix logic and add extra test
      in base/gpmisc.c, base/gslibctx.c.
    - CVE-2023-36664

 -- Marc Deslauriers <email address hidden> Wed, 05 Jul 2023 12:56:27 -0400

Source diff to previous version
CVE-2023-36664 Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).

Version: 9.50~dfsg-5ubuntu4.7 2023-04-13 23:07:15 UTC

  ghostscript (9.50~dfsg-5ubuntu4.7) focal-security; urgency=medium

  * SECURITY UPDATE: Buffer Overflow
    - debian/patches/CVE-2023-28879.patch: add check to make sure that the
      buffer has space for two characters in s_xBCPE_process() in base/sbcp.c.
    - CVE-2023-28879

 -- Rodrigo Figueiredo Zaiden <email address hidden> Thu, 13 Apr 2023 10:48:39 -0300

Source diff to previous version
CVE-2023-28879 In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in

Version: 9.50~dfsg-5ubuntu4.6 2022-09-27 15:07:04 UTC

  ghostscript (9.50~dfsg-5ubuntu4.6) focal-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow in lp8000_print_page()
    - debian/patches/CVE-2020-27792.patch: fixed output buffer size worst
      case in devices/gdevlp8k.c.
    - CVE-2020-27792

 -- Marc Deslauriers <email address hidden> Mon, 26 Sep 2022 10:40:09 -0400

Source diff to previous version
CVE-2020-27792 A heap-based buffer over write vulnerability was found in GhostScript's lp8000_print_page() function in gdevlp8k.c file. An attacker could trick a us

Version: 9.50~dfsg-5ubuntu4.5 2022-01-12 14:06:27 UTC

  ghostscript (9.50~dfsg-5ubuntu4.5) focal-security; urgency=medium

  * SECURITY UPDATE: use-after-free in sampled_data_sample
    - debian/patches/CVE-2021-45944.patch: check stack limits after
      function evaluation in psi/zfsample.c.
    - CVE-2021-45944
  * SECURITY UPDATE: heap-based buffer overflow in sampled_data_finish
    - debian/patches/CVE-2021-45949.patch: fix op stack management in
      psi/zfsample.c.
    - CVE-2021-45949

 -- Marc Deslauriers <email address hidden> Tue, 11 Jan 2022 09:22:11 -0500

CVE-2021-45944 Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).
CVE-2021-45949 Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp).



About   -   Send Feedback to @ubuntu_updates