-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3381-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb April 04, 2023 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : ghostscript Version : 9.27~dfsg-2+deb10u7 CVE ID : CVE-2023-28879 Debian Bug : 1033757 It was discovered that there was a potential buffer-overflow vulnerability in ghostscript, a popular interpreter for the PostScript language used, for example, to generate PDF files. For Debian 10 buster, this problem has been fixed in version 9.27~dfsg-2+deb10u7. We recommend that you upgrade your ghostscript packages. For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmQsTeUACgkQHpU+J9Qx HlhheA//aWDWzLjXyKcIwmMfmwftJtzXIpFknNMxoXyYrdyMCs8HJpdu5WbCmB5g 3Ia7M/f1VhF2SaFSEjSA0g7rpJYrCDg9UT/0OU/5aU6dArICwXG/cgRVxSRWr3Jt 6OgyjfpXLSI7OfohE2ViqOAUlomBzKzlGPQkPtzQfO8coSe0hng0h9qZvVt9jJz7 M+CxY5PMfuDMxsmpSElJqSg2SoxOOV+QgjvceEQvtAUe5qkGsiKxZSqGohkszrF3 UgyE5GVzqDYOqe0AdgtzydvnUkXk7S2lw0374fGCd1BRVgBGHeVIdNABHD7RYpoI 6XnaUpUJwVIMgIifN0JOvz/vDNtBYCcGBNqwL0k7uXUXVsGi0YcxdR1RaVk2bjTN tHuIS2Dk7ytDfwMRNyZhQYRKFQ+gw3ODVaqUZKtqNxaQLzVnDcHY1s4iKux3x/Lh 7oj1eu5pwp8MIyc1qrh6TwFe2jHn7PM+SzxKUZy784IWTMaVORSaf2XunAOY2Fxo 7rWefsv/EVB9KH92X6trx9kEL4F9ZFaQFV5YBcfXAvJSN0JGw4aV0R+4VAJ2l5jw 0MXdXHlm4+f/aoMxWNyKuyjC7sRMULCyErE2t4JJcd5AeTNF+l2T+x8mducudshU iC+sv4DNtcnAf2wKvuVLKLkHCBmegumTv4p+CB4syXiEc1wfrqQ= =sEME -----END PGP SIGNATURE-----