Package "libgs-dev"
Name: |
libgs-dev
|
Description: |
interpreter for the PostScript language and for PDF - Development Files
|
Latest version: |
10.03.1~dfsg1-0ubuntu2.3 |
Release: |
oracular (24.10) |
Level: |
security |
Repository: |
main |
Head package: |
ghostscript |
Homepage: |
https://www.ghostscript.com/ |
Links
Download "libgs-dev"
Other versions of "libgs-dev" in Oracular
Changelog
ghostscript (10.03.1~dfsg1-0ubuntu2.3) oracular-security; urgency=medium
* SECURITY UPDATE: directory escape via overlong encodings
- debian/patches/CVE-2025-46646.patch: handle another set of sequences
in base/gp_utf8.c.
- CVE-2025-46646
-- Marc Deslauriers <email address hidden> Wed, 30 Apr 2025 09:23:51 -0400
|
Source diff to previous version |
CVE-2025-46646 |
In Artifex Ghostscript before 10.05.0, decode_utf8 in base/gp_utf8.c mishandles overlong UTF-8 encoding. NOTE: this issue exists because of an incomp |
|
ghostscript (10.03.1~dfsg1-0ubuntu2.2) oracular-security; urgency=medium
* SECURITY UPDATE: Buffer overflow via serialization of DollarBlend
- debian/patches/CVE-2025-27830.patch: fix potential Buffer overflow
in base/write_t1.c, psi/zfapi.c.
- CVE-2025-27830
* SECURITY UPDATE: Text buffer overflow with long characters
- debian/patches/CVE-2025-27831.patch: prevent Unicode decoding overrun
in devices/vector/doc_common.c.
- CVE-2025-27831
* SECURITY UPDATE: Compression buffer overflow
- debian/patches/CVE-2025-27832.patch: avoid integer overflow leading
to buffer overflow in contrib/japanese/gdevnpdl.c.
- CVE-2025-27832
* SECURITY UPDATE: Buffer overflow with long TTF font name
- debian/patches/CVE-2025-27833.patch: check TTF name size before
copying to buffer in pdf/pdf_fmap.c.
- CVE-2025-27833
* SECURITY UPDATE: Buffer overflow caused by an oversized Type 4 function
- debian/patches/CVE-2025-27834.patch: guard against unsigned int
overflow in pdf/pdf_func.c.
- CVE-2025-27834
* SECURITY UPDATE: Buffer overflow when converting glyphs to unicode
- debian/patches/CVE-2025-27835.patch: fix confusion between bytes and
shorts in psi/zbfont.c.
- CVE-2025-27835
* SECURITY UPDATE: Print buffer overflow
- debian/patches/CVE-2025-27836-1.patch: fix potential print buffer
overflow in contrib/japanese/gdev10v.c.
- debian/patches/CVE-2025-27836-2.patch: fix compiler warnings in
contrib/japanese/gdev10v.c.
- CVE-2025-27836
-- Marc Deslauriers <email address hidden> Tue, 25 Mar 2025 13:42:18 -0400
|
Source diff to previous version |
CVE-2025-27830 |
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs during serialization of DollarBlend in a font, for base/write |
CVE-2025-27831 |
An issue was discovered in Artifex Ghostscript before 10.05.0. The DOCXWRITE TXTWRITE device has a text buffer overflow via long characters to device |
CVE-2025-27832 |
An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression buffer overflow for contrib/japanese/gdevnpdl.c. |
CVE-2025-27833 |
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long TTF font name to pdf/pdf_fmap.c. |
CVE-2025-27834 |
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an oversized Type 4 function in a PDF document to pdf/pdf |
CVE-2025-27835 |
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c. |
CVE-2025-27836 |
An issue was discovered in Artifex Ghostscript before 10.05.0. The BJ10V device has a Print buffer overflow in contrib/japanese/gdev10v.c. |
|
ghostscript (10.03.1~dfsg1-0ubuntu2.1) oracular-security; urgency=medium
* SECURITY UPDATE: incorrect Pattern Implementation type handling
- debian/patches/CVE-2024-46951.patch: check the type of the Pattern
Implementation in psi/zcolor.c.
- CVE-2024-46951
* SECURITY UPDATE: Buffer overflow in PDF XRef stream
- debian/patches/CVE-2024-46952.patch: sanitise W array values in Xref
streams in pdf/pdf_xref.c.
- CVE-2024-46952
* SECURITY UPDATE: output filename overflow
- debian/patches/CVE-2024-46953.patch: check for overflow validating
format string for the output file name in base/gsdevice.c.
- CVE-2024-46953
* SECURITY UPDATE: directory escape via overlong encodings
- debian/patches/CVE-2024-46954.patch: fix decode_utf8 to forbid
overlong encodings in base/gp_utf8.c.
- CVE-2024-46954
* SECURITY UPDATE: Out of bounds read when reading color
- debian/patches/CVE-2024-46955.patch: check Indexed colour space index
in psi/zcolor.c.
- CVE-2024-46955
* SECURITY UPDATE: incorrect buffer length check
- debian/patches/CVE-2024-46956.patch: fix length check in psi/zfile.c.
- CVE-2024-46956
-- Marc Deslauriers <email address hidden> Wed, 06 Nov 2024 11:08:51 -0500
|
CVE-2024-46951 |
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead |
CVE-2024-46952 |
An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (rel |
CVE-2024-46953 |
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for th |
CVE-2024-46954 |
An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directo |
CVE-2024-46955 |
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. There is an out-of-bounds read when reading color in Indexed color spa |
CVE-2024-46956 |
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code |
|
About
-
Send Feedback to @ubuntu_updates