lp://staging/ubuntu/hardy-security/ghostscript
- Get this branch:
- bzr branch lp://staging/ubuntu/hardy-security/ghostscript
Branch merges
Branch information
Recent revisions
- 28. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service and possible code execution via
icclib overflow
- debian/patches/ CVE-2012- 4405.dpatch: validate input channels in
icclib/icc.c.
- CVE-2012-4405 - 27. By Marc Deslauriers
-
* SECURITY UPDATE: integer overflows via integer multiplication for
memory allocation
- debian/patches/ CVE-2008- 352x.dpatch: introduce new size-checked
allocation functions and use them in:
* jasper/src/libjasper/ base/{jas_ cm.c,jas_ icc.c,jas_ image.c,
jas_malloc. c,jas_seq. c}
* jasper/src/libjasper/ bmp/bmp_ dec.c
* jasper/src/libjasper/ include/ jasper/ jas_malloc. h
* jasper/src/libjasper/ jp2/{jp2_ cod.c,jp2_ dec.c,jp2_ enc.c}
* jasper/src/libjasper/ jpc/{jpc_ cs.c,jpc_ dec.c,jpc_ enc.c,jpc_ mqdec.c,
jpc_mqenc.c, jpc_qmfb. c,jpc_t1enc. c,jpc_t2cod. c,jpc_t2dec. c,
jpc_t2enc.c, jpc_tagtree. c,jpc_util. c}
* jasper/src/libjasper/ mif/mif_ cod.c
- CVE-2008-3520
* SECURITY UPDATE: buffer overflow via vsprintf in jas_stream_printf()
- debian/patches/ CVE-2008- 352x.dpatch: use vsnprintf() in
jasper/src/libjasper/ base/jas_ stream. c
- CVE-2008-3522
* SECURITY UPDATE: arbitrary code execution or denial of service via
off-by-one in TrueType interpreter.
- debian/patches/ CVE-2009- 3743.dpatch: check for null in src/ttinterp.c.
- CVE-2009-3743
* SECURITY UPDATE: denial of service via crafted font data
- debian/patches/ CVE-2010- 4054.dpatch: check for null pointers in
src/{gsgdata. c,gstype1. c,gstype2. c,gxtype1. c}.
- CVE-2010-4054
* SECURITY UPDATE: denial of service and possible code execution via
heap-based buffer overflows.
- debian/patches/ CVE-2011- 451x.dpatch: validate compparms->numrlvls
and allocate proper size in jasper/src/libjasper/ jpc/jpc_ cs.c.
- CVE-2011-4516
- CVE-2011-4517 - 26. By Marc Deslauriers
-
* SECURITY UPDATE: arbitrary code execution via unlimited recursive
procedure invocations (LP: #546009)
- debian/patches/ CVE-2010- 1628.dpatch: only initialize structures if
all allocations were successful in src/ialloc.c, src/idosave.h,
src/isave.c.
- CVE-2010-1628
* SECURITY UPDATE: arbitrary code execution via crafted PostScript file
(LP: #546009)
- debian/patches/ CVE-2010- 1869.dpatch: use correct buffer sizes in
src/int.mak, src/iscan.c, src/iscan.h.
- CVE-2010-1869
* SECURITY UPDATE: arbitrary code execution via long names
- debian/patches/ security- long-names. dpatch: check against maximum size
in psi/iscan.c.
- No CVE number yet. - 25. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service and possible arbitrary code
execution via buffer underflow in the CCITTFax decoding filter
- debian/patches/ 33_CVE- 2007-6725. dpatch: work around the buffer
underflow in src/scfd.c.
- CVE-2007-6725
* SECURITY UPDATE: denial of service and possible arbitrary code
execution via BaseFont writer module
- debian/patches/ 34_CVE- 2008-6679. dpatch: increase size of buffer in
src/gdevpdtb.c.
- CVE-2008-6679
* SECURITY UPDATE: possible arbitrary code execution via JBIG2 symbol
dictionary segments
- debian/patches/ 35_CVE- 2009-0196. dpatch: validate size of runlength
in export symbol table in jbig2dec/jbig2_symbol_ dict.c.
- CVE-2009-0196
* SECURITY UPDATE: denial of service and possible arbitrary code
execution via integer overflows in icclib
- debian/patches/ 36_CVE- 2009-0792. dpatch: fix numerous overflows in
icclib/icc.c.
- CVE-2009-0792 - 24. By Marc Deslauriers
-
* SECURITY UPDATE: Arbitrary code execution due to integer overflows and
insufficient upper-bounds checks in the ICC library
- debian/patches/ 32_CVE- 2009-0583_ 0584.dpatch: fix multiple integer
overflows and perform bounds checking in icclib/icc.c.
- CVE-2009-0583
- CVE-2009-0584 - 23. By Jamie Strandboge
-
* SECURITY UPDATE: buffer overflow in color space handling code
* debian/patches/ 31_CVE- 2008-0411. dpatch: fix zseticcspace() to perform
range checks
* References
CVE-2008-0411 - 21. By Till Kamppeter
-
* Merge from debian unstable, remaining changes:
- gs-esp and gs-common depend only on ghostscript, not on ghostscript-x,
as gs-esp had already split off gs-esp-x in Ubuntu
- Updated the KRGB patch from HP to the newest upstream version with
added checks for null forward device in the graphic procedures to fix
segfault bug LP: #69905 and corrected "force banding" code in gsijs_open
for small images (IE: hagaki in landscape). - 20. By Martin Pitt
-
debian/rules: Do not ship README.gz in ghostscript, it collides with
ghostscript-doc. (LP: #185602, Debian #460692) - 19. By Till Kamppeter
-
debian/
patches/ 09_ijs_ krgb_support. dpatch: Updated the KRGB patch from
HP to the newest upstream version with added checks for null forward
device in the graphic procedures to fix segfault bug LP: #69905 and
corrected "force banding" code in gsijs_open for small images (IE:
hagaki in landscape).
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ubuntu/karmic/ghostscript