Package: ghostscript
Version: 8.62.dfsg.1-3.2lenny1
Severity: serious
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for jasper.  Ghostscript embeds jasper in lenny embeds
jasper, and statically links to jasper in unstable (so it needs to be
rebuilt).

CVE-2008-3520[0]:
| Multiple integer overflows in JasPer 1.900.1 might allow
| context-dependent attackers to have an unknown impact via a crafted
| image file, related to integer multiplication for memory allocation.

CVE-2008-3522[1]:
| Buffer overflow in the jas_stream_printf function in
| libjasper/base/jas_stream.c in JasPer 1.900.1 might allow
| context-dependent attackers to have an unknown impact via vectors
| related to the mif_hdr_put function and use of vsprintf.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
    http://security-tracker.debian.org/tracker/CVE-2008-3520
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
    http://security-tracker.debian.org/tracker/CVE-2008-3522



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to