-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat,  3 Sep 2022 23:35:17 CEST
Source: ghostscript
Architecture: source
Version: 9.27~dfsg-2+deb10u6
Distribution: buster-security
Urgency: high
Maintainer: Debian Printing Team <debian-print...@lists.debian.org>
Changed-By: Markus Koschany <a...@debian.org>
Checksums-Sha1:
 08072a8dd9dd85ae0e104a7b15721c94b3d7b3c3 2946 
ghostscript_9.27~dfsg-2+deb10u6.dsc
 885aa098b0d2fb25b84cea4861639c7becad8481 126324 
ghostscript_9.27~dfsg-2+deb10u6.debian.tar.xz
 f77928d3001e295d6ce3765c489c54c9de88179f 12575 
ghostscript_9.27~dfsg-2+deb10u6_amd64.buildinfo
Checksums-Sha256:
 e729529135c1103c4c22d404e6dc1394238360ac7a166451541fbc1830915ad0 2946 
ghostscript_9.27~dfsg-2+deb10u6.dsc
 d06f0541d1cb64e9c755bb359b3aeb12e0e13ceb3dcb50cdc324e2f7d168078a 126324 
ghostscript_9.27~dfsg-2+deb10u6.debian.tar.xz
 01bea78611e04496cf7e5eb40d7de20f80458509a94beeeb85b4d4cc0e81e5e9 12575 
ghostscript_9.27~dfsg-2+deb10u6_amd64.buildinfo
Changes:
 ghostscript (9.27~dfsg-2+deb10u6) buster-security; urgency=high
 .
   * Non-maintainer upload by the LTS team.
   * Fix CVE-2020-27792:
     A heap-based buffer over write vulnerability was found in GhostScript's
     lp8000_print_page() function in gdevlp8k.c file. An attacker could trick a
     user to open a crafted PDF file, triggering the heap buffer overflow that
     could lead to memory corruption or a denial of service.
Files:
 10e575cbfe627741577c410f1bcbdd6e 2946 text optional 
ghostscript_9.27~dfsg-2+deb10u6.dsc
 844f3e121035e07e484bc94160e13ce8 126324 text optional 
ghostscript_9.27~dfsg-2+deb10u6.debian.tar.xz
 1056f424fe185339f2708207809ecb94 12575 text optional 
ghostscript_9.27~dfsg-2+deb10u6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=t2CO
-----END PGP SIGNATURE-----

Reply via email to