Package: ghostscript Version: 8.62.dfsg.1-3.2lenny1 Severity: serious Tags: security
Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for jasper. Ghostscript embeds jasper in lenny embeds jasper, and statically links to jasper in unstable (so it needs to be rebuilt). CVE-2008-3520[0]: | Multiple integer overflows in JasPer 1.900.1 might allow | context-dependent attackers to have an unknown impact via a crafted | image file, related to integer multiplication for memory allocation. CVE-2008-3522[1]: | Buffer overflow in the jas_stream_printf function in | libjasper/base/jas_stream.c in JasPer 1.900.1 might allow | context-dependent attackers to have an unknown impact via vectors | related to the mif_hdr_put function and use of vsprintf. If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520 http://security-tracker.debian.org/tracker/CVE-2008-3520 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522 http://security-tracker.debian.org/tracker/CVE-2008-3522 -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org