-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 3 Sep 2022 23:35:17 CEST Source: ghostscript Architecture: source Version: 9.27~dfsg-2+deb10u6 Distribution: buster-security Urgency: high Maintainer: Debian Printing Team <debian-print...@lists.debian.org> Changed-By: Markus Koschany <a...@debian.org> Checksums-Sha1: 08072a8dd9dd85ae0e104a7b15721c94b3d7b3c3 2946 ghostscript_9.27~dfsg-2+deb10u6.dsc 885aa098b0d2fb25b84cea4861639c7becad8481 126324 ghostscript_9.27~dfsg-2+deb10u6.debian.tar.xz f77928d3001e295d6ce3765c489c54c9de88179f 12575 ghostscript_9.27~dfsg-2+deb10u6_amd64.buildinfo Checksums-Sha256: e729529135c1103c4c22d404e6dc1394238360ac7a166451541fbc1830915ad0 2946 ghostscript_9.27~dfsg-2+deb10u6.dsc d06f0541d1cb64e9c755bb359b3aeb12e0e13ceb3dcb50cdc324e2f7d168078a 126324 ghostscript_9.27~dfsg-2+deb10u6.debian.tar.xz 01bea78611e04496cf7e5eb40d7de20f80458509a94beeeb85b4d4cc0e81e5e9 12575 ghostscript_9.27~dfsg-2+deb10u6_amd64.buildinfo Changes: ghostscript (9.27~dfsg-2+deb10u6) buster-security; urgency=high . * Non-maintainer upload by the LTS team. * Fix CVE-2020-27792: A heap-based buffer over write vulnerability was found in GhostScript's lp8000_print_page() function in gdevlp8k.c file. An attacker could trick a user to open a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service. Files: 10e575cbfe627741577c410f1bcbdd6e 2946 text optional ghostscript_9.27~dfsg-2+deb10u6.dsc 844f3e121035e07e484bc94160e13ce8 126324 text optional ghostscript_9.27~dfsg-2+deb10u6.debian.tar.xz 1056f424fe185339f2708207809ecb94 12575 text optional ghostscript_9.27~dfsg-2+deb10u6_amd64.buildinfo
-----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmMTyOlfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1HkTdwQAJRgAfno+7MDasMpodbMKK8vDMx4cMxb9iR9 s1ry5HmCnNfp9AABMKe8AOReYnrREi+kG6R2uY0prVxIhWIwFKoLa9OYInpXv4CY 5D/P5qj1/ZK99juq3ef+dhNhH26CQnG2Vsc2QQYjlf/1FsJpoEAOntuEZOjQo48p 0BCivmchOseCtdxaNvWuEGzvIL3Ic8ruAo/2lATVVHp5LJf3uNIQy5eYETNUFgmZ bFFUeWrnJA8wlwOh3QQ3UL6H7kdrDULn+d1kq/OMOpTyBWELpd2n9+mAtOVUcmUx T5q3Ydp6XsNZcPbYfkqDSV3Pf032rGxN0U4361IwFEr7EVa3CzpqCEzzg3mdcMvN GqpnZYrokW0HwQ4nxNgW0q+mi4iE6IM3Z/1gBY59jWTkBs5wmAtk2PFeZ0aaySAX 5u2ZPPCmw5sAYCyVNH7xiVkA4M5r/QAD1/b1md5pIXBBXdC1Erwkhe1KvA24lftm g1qUkgIRYBlVYXPNGxlqiqH7xFDSSKnd7LWnVVJ+sEAASZEBvP/z771M0LD3pZs5 +gsr4OrcamHeX4q+eEc/+sHtrdQp9DUSF++7LIOogRuTC9lHMACnIno0hnkSmg4X TxXJFxpuLo2G9UMbYJXOBz6GA0NIF1ZA/fDda/u0bwrMdV/4UhQafgGQM8MFMw0s JwaXR/jZ =t2CO -----END PGP SIGNATURE-----