Branches for Intrepid

Name Status Last Modified Last Commit
lp:ubuntu/intrepid/ghostscript 2 Mature 2009-07-08 22:06:49 UTC
30. * debian/patches/42_gs-init-ps-delayb...

Author: Till Kamppeter
Revision Date: 2008-10-19 12:48:22 UTC

* debian/patches/42_gs-init-ps-delaybind-fix.dpatch: Make "ps2ascii" working
  again (LP: #281419, upstream bug #690124).

* debian/patches/45_bjc600-bjc800-pdf-input.dpatch: Fix setting of the
  "DitheringType" option. With PDF input Ghostscript crashes, with
  PostScript input the "DitheringType" option was probably ignored
  (Upstream bug #690032).

* debian/patches/48_cups-output-device-pdf-duplex-uninitialized-memory.patch.dpatch:
  Fixed several bugs in the "cups" (CUPS Raster) output device:
   - Ghostscript crashed with PDF input data
   - The "Duplex" and "MediaWeight" options were ignored
   - There was uninitialized memory and wrong usage of pointers, potential
     cause for segmentation faults or even vulnerabilities
   - There were mismatches in data types, leading to possible breakage
     of the "AdvanceDistance", "MediaWeight", and "cupsStringXX" options.
  (Upstream bug #690101).

lp:ubuntu/intrepid-proposed/ghostscript 2 Mature 2009-07-08 22:07:19 UTC
32. debian/patches/72_gs-setpd-ps-duplex-...

Author: Till Kamppeter
Revision Date: 2008-01-22 16:39:22 UTC

debian/patches/72_gs-setpd-ps-duplex-fix.dpatch: Duplex printing did not
work in some cases (LP: #308817).

lp:ubuntu/intrepid-security/ghostscript 2 Mature 2009-07-08 22:07:04 UTC
32. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2009-04-09 10:23:53 UTC

* SECURITY UPDATE: denial of service and possible arbitrary code
  execution via BaseFont writer module
  - debian/patches/74_CVE-2008-6679.dpatch: increase size of buffer in
    src/gdevpdtb.c.
  - CVE-2008-6679
* SECURITY UPDATE: possible arbitrary code execution via JBIG2 symbol
  dictionary segments
  - debian/patches/75_CVE-2009-0196.dpatch: validate size of runlength
    in export symbol table in jbig2dec/jbig2_symbol_dict.c.
  - CVE-2009-0196
* SECURITY UPDATE: denial of service and possible arbitrary code
  execution via integer overflows in icclib
  - debian/patches/76_CVE-2009-0792.dpatch: fix numerous overflows in
    icclib/icc.c.
  - CVE-2009-0792

lp:ubuntu/intrepid-updates/ghostscript 2 Mature 2009-07-08 22:07:30 UTC
32. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2009-04-09 10:23:53 UTC

* SECURITY UPDATE: denial of service and possible arbitrary code
  execution via BaseFont writer module
  - debian/patches/74_CVE-2008-6679.dpatch: increase size of buffer in
    src/gdevpdtb.c.
  - CVE-2008-6679
* SECURITY UPDATE: possible arbitrary code execution via JBIG2 symbol
  dictionary segments
  - debian/patches/75_CVE-2009-0196.dpatch: validate size of runlength
    in export symbol table in jbig2dec/jbig2_symbol_dict.c.
  - CVE-2009-0196
* SECURITY UPDATE: denial of service and possible arbitrary code
  execution via integer overflows in icclib
  - debian/patches/76_CVE-2009-0792.dpatch: fix numerous overflows in
    icclib/icc.c.
  - CVE-2009-0792

14 of 4 results