Debian alert DLA-3096-1 (ghostscript)
| From: | Markus Koschany <apo@debian.org> | |
| To: | debian-lts-announce <debian-lts-announce@lists.debian.org> | |
| Subject: | [SECURITY] [DLA 3096-1] ghostscript security update | |
| Date: | Sun, 04 Sep 2022 00:19:45 +0200 | |
| Message-ID: | <8207c7370f939b6bbbb044700c7bde4b8ead7473.camel@debian.org> |
------------------------------------------------------------------------- Debian LTS Advisory DLA-3096-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany September 04, 2022 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : ghostscript Version : 9.27~dfsg-2+deb10u6 CVE ID : CVE-2020-27792 A heap-based buffer over write vulnerability was found in GhostScript, the GPL PostScript/PDF interpreter. An attacker could trick a user to open a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service. For Debian 10 buster, this problem has been fixed in version 9.27~dfsg-2+deb10u6. We recommend that you upgrade your ghostscript packages. For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
