Package: ghostscript
Version: 8.64~dfsg-1
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for ghostscript.

CVE-2009-0584[0]:
| icc.c in the International Color Consortium (ICC) Format library (aka
| icclib), as used in Ghostscript 8.64 and earlier and Argyll Color
| Management System (CMS) 1.0.3 and earlier, allows context-dependent
| attackers to cause a denial of service (application crash) or possibly
| execute arbitrary code by using a device file for processing a crafted
| image file associated with large integer values for certain sizes,
| related to an ICC profile in a (1) PostScript or (2) PDF file with
| embedded images.

CVE-2009-0583[1]:
| Multiple integer overflows in icc.c in the International Color
| Consortium (ICC) Format library (aka icclib), as used in Ghostscript
| 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and
| earlier, allow context-dependent attackers to cause a denial of
| service (heap-based buffer overflow and application crash) or possibly
| execute arbitrary code by using a device file for a translation
| request that operates on a crafted image file and targets a certain
| "native color space," related to an ICC profile in a (1) PostScript or
| (2) PDF file with embedded images.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

We already have fixed packages for stable/oldstable, the 
patches in their probably apply for the unstable version as 
well.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584
    http://security-tracker.debian.net/tracker/CVE-2009-0584
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583
    http://security-tracker.debian.net/tracker/CVE-2009-0583

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpgQkGJPWouQ.pgp
Description: PGP signature

Reply via email to