|
|
Log in / Subscribe / Register

Debian alert DLA-3096-1 (ghostscript)

From:  Markus Koschany <apo@debian.org>
To:  debian-lts-announce <debian-lts-announce@lists.debian.org>
Subject:  [SECURITY] [DLA 3096-1] ghostscript security update
Date:  Sun, 04 Sep 2022 00:19:45 +0200
Message-ID:  <8207c7370f939b6bbbb044700c7bde4b8ead7473.camel@debian.org>

------------------------------------------------------------------------- Debian LTS Advisory DLA-3096-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany September 04, 2022 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : ghostscript Version : 9.27~dfsg-2+deb10u6 CVE ID : CVE-2020-27792 A heap-based buffer over write vulnerability was found in GhostScript, the GPL PostScript/PDF interpreter. An attacker could trick a user to open a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service. For Debian 10 buster, this problem has been fixed in version 9.27~dfsg-2+deb10u6. We recommend that you upgrade your ghostscript packages. For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds