Change logs for ghostscript source package in Nile V2.0

  • ghostscript (10.02.1~dfsg1-ok4) nile; urgency=medium
    
      * SECURITY UPDATE: stack-based buffer overflow via long PDF filter
        name     - debian/patches/CVE-2024-29506.patch: don't allow PDF
        files with bad       Filters to overflow the debug buffer in
        pdf/pdf_file.c.     - CVE-2024-29506   * SECURITY UPDATE: stack-
        based buffer overflows     - debian/patches/CVE-2024-29507.patch:
        bounds checks when using CIDFont       related params in
        pdf/pdf_font.c, pdf/pdf_warnings.h.     - CVE-2024-29507   *
        SECURITY UPDATE: heap-based pointer disclosure via constructed
        BaseFont     name     - debian/patches/CVE-2024-29508.patch: review
        printing of pointers in       base/gsfont.c, base/gsicc_cache.c,
        base/gsmalloc.c, base/gxclmem.c,       base/gxcpath.c,
        base/gxpath.c, base/szlibc.c, devices/gdevupd.c,
        devices/vector/gdevpdtb.c, psi/ialloc.c, psi/igc.c, psi/igcstr.c,
        psi/iinit.c, psi/imainarg.c, psi/isave.c, psi/iutil.c.     -
        debian/patches/CVE-2024-29508-2.patch: fix compiler warning in
        optimised build in base/gsicc_cache.c.     - debian/patches/CVE-2024-
        29508-3.patch: remove extra arguments in       devices/gdevupd.c.
        - CVE-2024-29508   * SECURITY UPDATE: heap-based overflow via
        PDFPassword with null byte     - debian/patches/CVE-2024-
        29509.patch: don't use strlen on passwords in       pdf/pdf_sec.c.
        - CVE-2024-29509   * SECURITY UPDATE: directory traversal issue via
        OCRLanguage     - debian/patches/CVE-2024-29511.patch: reject
        OCRLanguage changes after       SAFER enabled in devices/gdevocr.c,
        devices/gdevpdfocr.c,       devices/vector/gdevpdfp.c.     -
        debian/patches/CVE-2024-29511-2.patch: original fix was overly
        aggressive in devices/gdevocr.c, devices/gdevpdfocr.c,
        devices/vector/gdevpdf.c, devices/vector/gdevpdfp.c.     - CVE-2024-
        29511
    
     -- liubo01 <email address hidden>  Tue, 05 Nov 2024 11:37:45 +0800
  • ghostscript (10.02.1~dfsg1-ok3) nile; urgency=medium
    
      * reserve CVE change.
    
     -- liubo01 <email address hidden>  Tue, 05 Nov 2024 11:29:51 +0800
  • ghostscript (10.02.1~dfsg1-ok2) nile; urgency=medium
    
      * Fix CVE-2024-29510 CVE-2024-33869 CVE-2024-33870 CVE-2024-33871
    
     -- liubo01 <email address hidden>  Mon, 08 Jul 2024 17:33:23 +0800
  • ghostscript (10.02.1~dfsg1-ok1) nile; urgency=medium
    
      * Sync upstream version.
    
     -- zhouganqing <email address hidden>  Fri, 19 Apr 2024 10:21:27 +0800
  • ghostscript (9.50~dfsg-ok8) nile; urgency=medium
    
      * No change rebuild
    
     -- CI Bot <email address hidden>  Thu, 18 Apr 2024 12:44:06 +0000
  • ghostscript (9.50~dfsg-ok5) yangtze; urgency=medium
    
      * CVE问题修复:
        - CVE-2023-28879
        - CVE-2020-16289
        - CVE-2023-36664
        - CVE-2020-16295
        - CVE-2020-16292
        - CVE-2020-16293
        - CVE-2020-16296
        - CVE-2020-16294
        - CVE-2020-16301
        - CVE-2020-16300
    
     -- jiangdingyuan <email address hidden>  Wed, 02 Aug 2023 10:19:20 +0800
  • ghostscript (9.50~dfsg-ok4) yangtze; urgency=medium
    
      * another-lin CVE-2020-16288 安全更新:修复缓冲区错误的漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等.
    
     -- zhonglinliang <email address hidden>  Fri, 24 Mar 2023 15:32:33 +0800