ghostscript: CVE-2009-058{3,4} multiple integer overflows resulting in arbitrary code execution

Related Vulnerabilities: CVE-2009-0584   CVE-2009-0583   CVE-2009-0792   CVE-2009-0196  

Debian Bug report logs - #522416
ghostscript: CVE-2009-058{3,4} multiple integer overflows resulting in arbitrary code execution

version graph

Reported by: Nico Golde <nion@debian.org>

Date: Fri, 3 Apr 2009 15:21:02 UTC

Severity: grave

Tags: security

Found in version ghostscript/8.64~dfsg-1

Fixed in versions ghostscript/8.64~dfsg-1.1, ghostscript/8.64~dfsg-1+squeeze1

Done: Nico Golde <nion@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Masayuki Hatta (mhatta) <mhatta@debian.org>:
Bug#522416; Package ghostscript. (Fri, 03 Apr 2009 15:21:04 GMT) (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
New Bug report received and forwarded. Copy sent to Masayuki Hatta (mhatta) <mhatta@debian.org>. (Fri, 03 Apr 2009 15:21:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: submit@bugs.debian.org
Subject: ghostscript: CVE-2009-058{3,4} multiple integer overflows resulting in arbitrary code execution
Date: Fri, 3 Apr 2009 17:18:15 +0200
[Message part 1 (text/plain, inline)]
Package: ghostscript
Version: 8.64~dfsg-1
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for ghostscript.

CVE-2009-0584[0]:
| icc.c in the International Color Consortium (ICC) Format library (aka
| icclib), as used in Ghostscript 8.64 and earlier and Argyll Color
| Management System (CMS) 1.0.3 and earlier, allows context-dependent
| attackers to cause a denial of service (application crash) or possibly
| execute arbitrary code by using a device file for processing a crafted
| image file associated with large integer values for certain sizes,
| related to an ICC profile in a (1) PostScript or (2) PDF file with
| embedded images.

CVE-2009-0583[1]:
| Multiple integer overflows in icc.c in the International Color
| Consortium (ICC) Format library (aka icclib), as used in Ghostscript
| 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and
| earlier, allow context-dependent attackers to cause a denial of
| service (heap-based buffer overflow and application crash) or possibly
| execute arbitrary code by using a device file for a translation
| request that operates on a crafted image file and targets a certain
| "native color space," related to an ICC profile in a (1) PostScript or
| (2) PDF file with embedded images.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

We already have fixed packages for stable/oldstable, the 
patches in their probably apply for the unstable version as 
well.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584
    http://security-tracker.debian.net/tracker/CVE-2009-0584
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583
    http://security-tracker.debian.net/tracker/CVE-2009-0583

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Masayuki Hatta (mhatta) <mhatta@debian.org>:
Bug#522416; Package ghostscript. (Tue, 21 Apr 2009 23:54:02 GMT) (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
Extra info received and forwarded to list. Copy sent to Masayuki Hatta (mhatta) <mhatta@debian.org>. (Tue, 21 Apr 2009 23:54:02 GMT) (full text, mbox, link).


Message #10 received at 522416@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 524915@bugs.debian.org, 522416@bugs.debian.org, 524803@bugs.debian.org
Subject: intent to NMU
Date: Wed, 22 Apr 2009 01:51:31 +0200
[Message part 1 (text/plain, inline)]
Hi,
attached is a patch that fixes the described issues which I 
am going to upload as a 0-day NMU as there was no reaction 
on these bugs yet.

It will be also archived on:
http://people.debian.org/~nion/nmu-diff/ghostscript-8.64~dfsg-1_8.64~dfsg-1.1.patch

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[ghostscript-8.64~dfsg-1_8.64~dfsg-1.1.patch (text/x-diff, attachment)]
[Message part 3 (application/pgp-signature, inline)]

Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (Wed, 22 Apr 2009 00:06:03 GMT) (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (Wed, 22 Apr 2009 00:06:03 GMT) (full text, mbox, link).


Message #15 received at 522416-close@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 522416-close@bugs.debian.org
Subject: Bug#522416: fixed in ghostscript 8.64~dfsg-1.1
Date: Wed, 22 Apr 2009 00:02:07 +0000
Source: ghostscript
Source-Version: 8.64~dfsg-1.1

We believe that the bug you reported is fixed in the latest version of
ghostscript, which is due to be installed in the Debian FTP archive:

ghostscript-doc_8.64~dfsg-1.1_all.deb
  to pool/main/g/ghostscript/ghostscript-doc_8.64~dfsg-1.1_all.deb
ghostscript-x_8.64~dfsg-1.1_amd64.deb
  to pool/main/g/ghostscript/ghostscript-x_8.64~dfsg-1.1_amd64.deb
ghostscript_8.64~dfsg-1.1.diff.gz
  to pool/main/g/ghostscript/ghostscript_8.64~dfsg-1.1.diff.gz
ghostscript_8.64~dfsg-1.1.dsc
  to pool/main/g/ghostscript/ghostscript_8.64~dfsg-1.1.dsc
ghostscript_8.64~dfsg-1.1_amd64.deb
  to pool/main/g/ghostscript/ghostscript_8.64~dfsg-1.1_amd64.deb
gs-aladdin_8.64~dfsg-1.1_all.deb
  to pool/main/g/ghostscript/gs-aladdin_8.64~dfsg-1.1_all.deb
gs-common_8.64~dfsg-1.1_all.deb
  to pool/main/g/ghostscript/gs-common_8.64~dfsg-1.1_all.deb
gs-esp_8.64~dfsg-1.1_all.deb
  to pool/main/g/ghostscript/gs-esp_8.64~dfsg-1.1_all.deb
gs-gpl_8.64~dfsg-1.1_all.deb
  to pool/main/g/ghostscript/gs-gpl_8.64~dfsg-1.1_all.deb
gs_8.64~dfsg-1.1_all.deb
  to pool/main/g/ghostscript/gs_8.64~dfsg-1.1_all.deb
libgs-dev_8.64~dfsg-1.1_amd64.deb
  to pool/main/g/ghostscript/libgs-dev_8.64~dfsg-1.1_amd64.deb
libgs8_8.64~dfsg-1.1_amd64.deb
  to pool/main/g/ghostscript/libgs8_8.64~dfsg-1.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 522416@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <nion@debian.org> (supplier of updated ghostscript package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 22 Apr 2009 00:19:51 +0200
Source: ghostscript
Binary: ghostscript gs gs-esp gs-gpl gs-aladdin gs-common ghostscript-x ghostscript-doc libgs8 libgs-dev
Architecture: source all amd64
Version: 8.64~dfsg-1.1
Distribution: unstable
Urgency: high
Maintainer: Masayuki Hatta (mhatta) <mhatta@debian.org>
Changed-By: Nico Golde <nion@debian.org>
Description: 
 ghostscript - The GPL Ghostscript PostScript/PDF interpreter
 ghostscript-doc - The GPL Ghostscript PostScript/PDF interpreter - Documentation
 ghostscript-x - The GPL Ghostscript PostScript/PDF interpreter - X Display suppor
 gs         - Transitional package
 gs-aladdin - Transitional package
 gs-common  - Dummy package depending on ghostscript
 gs-esp     - Transitional package
 gs-gpl     - Transitional package
 libgs-dev  - The Ghostscript PostScript Library - Development Files
 libgs8     - The Ghostscript PostScript/PDF interpreter Library
Closes: 522416 524803 524915
Changes: 
 ghostscript (8.64~dfsg-1.1) unstable; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * This update fixes various security issues:
     - CVE-2009-0792: multiple integer overflows in the icc library
       can cause a heap-based buffer overflow possibly leading to arbitray
       code execution.
     - CVE-2009-0584/CVE-2009-0583: Multiple integer overflows causing an
       application crash or possibly arbitrary code execution.
     - CVE-2009-0196: heap-based buffer overflow in big2_decode_symbol_dict()
       leading to arbitrary code execution via a crafted JBIG2 symbol
       dictionary segment.
       .
       (Closes: #524915, #522416, #524803)
Checksums-Sha1: 
 48bc19b292ba7fb13834b44605fd9cb5159494a4 1658 ghostscript_8.64~dfsg-1.1.dsc
 ee96233f4e4193fa02b59fcca02dc6520cc4669a 85786 ghostscript_8.64~dfsg-1.1.diff.gz
 edab987df5b0e64fba7f8ebd8e8289ceb407351d 30578 gs_8.64~dfsg-1.1_all.deb
 4a44c06643c3ff2bc3057ba0c65371d706f489ec 30580 gs-esp_8.64~dfsg-1.1_all.deb
 27b3d212393054e351853a33d3c1430c5bfc6b8c 30584 gs-gpl_8.64~dfsg-1.1_all.deb
 4c63ee50c2f8711e86a9a83916f52861623d67b5 30586 gs-aladdin_8.64~dfsg-1.1_all.deb
 ca04fe4286efe55cd2e13819aa0e8ac2b746ff30 30838 gs-common_8.64~dfsg-1.1_all.deb
 70642368aa4ee1f48ca6042e37e763f279515726 2967238 ghostscript-doc_8.64~dfsg-1.1_all.deb
 41e5bd0f754230194f52a9833e3bfc85a15bb77f 770316 ghostscript_8.64~dfsg-1.1_amd64.deb
 e238145504a7dd3143d282edfdd42819f0ab931f 64714 ghostscript-x_8.64~dfsg-1.1_amd64.deb
 ebe85b907136c30925520e65094568ee1cfd6450 2399198 libgs8_8.64~dfsg-1.1_amd64.deb
 3974e4cceb13266505e0b5e5b849c838747d052e 38346 libgs-dev_8.64~dfsg-1.1_amd64.deb
Checksums-Sha256: 
 0d4bae2b02705659308f06527343ea8c269be555de6d52410201f9da3a2caf7b 1658 ghostscript_8.64~dfsg-1.1.dsc
 4828b4680c4d897c06ed8d895004cb7eae50bd5a0d2970a17c34f197e65d86e3 85786 ghostscript_8.64~dfsg-1.1.diff.gz
 8c8c43a820fa897ebd0e990d30feebdc283c5873c0eef75caa9da720271dcd91 30578 gs_8.64~dfsg-1.1_all.deb
 7209fa298a4ab6ee84a5affd53ef3cb006d49f4311eaca9043beac605b199fce 30580 gs-esp_8.64~dfsg-1.1_all.deb
 0c0a2fe0b4cbd1ecbb8adcd1dfb9d2d5afee08d54189aaa2c593c87cc3d8e515 30584 gs-gpl_8.64~dfsg-1.1_all.deb
 5379d214ea23c3e182cdfa4e4e1ee793a23754a47083ab2042e228dfa77d9de5 30586 gs-aladdin_8.64~dfsg-1.1_all.deb
 c3469692907c6afff25b6ff6a22a0fa778fea1238d136c6c6cbe98ed84fab3ab 30838 gs-common_8.64~dfsg-1.1_all.deb
 4c076b69eb93f9635e2ea4343e6c92be3976aa15880b509cbf70a042d2943ea8 2967238 ghostscript-doc_8.64~dfsg-1.1_all.deb
 c15e453acfab7a233e805356c631bdf341c6dc501dae4a8ca9f24ffb3ea07d8d 770316 ghostscript_8.64~dfsg-1.1_amd64.deb
 4726ff1be484e4b29d01b863964cf6e3a2fc51eb0620dbe3e6d73b9828c8e4a1 64714 ghostscript-x_8.64~dfsg-1.1_amd64.deb
 a51cdf7a3dcddead8db46225a65eccf17c04fafc34e07b9df19074ddf4c3e852 2399198 libgs8_8.64~dfsg-1.1_amd64.deb
 e45c54461b6d74462acbef5db96a2575d24f0c4f5923f1c523b446d3ba15a068 38346 libgs-dev_8.64~dfsg-1.1_amd64.deb
Files: 
 2cb5e199d8a542bb9fe2491d199a5a37 1658 text optional ghostscript_8.64~dfsg-1.1.dsc
 b75e64ce81ee96df3bc296730685cf5b 85786 text optional ghostscript_8.64~dfsg-1.1.diff.gz
 4d8696d211e330dc102e5859a1d22482 30578 text extra gs_8.64~dfsg-1.1_all.deb
 4575e835cf84f61e85b095ef14d18555 30580 text extra gs-esp_8.64~dfsg-1.1_all.deb
 3ea99fcaddc2f57305e17542f8e7f0eb 30584 text extra gs-gpl_8.64~dfsg-1.1_all.deb
 a19a2211a52c7799d9d97b42da6682b8 30586 text extra gs-aladdin_8.64~dfsg-1.1_all.deb
 226ec96efd4510e42e24ca53d9e59da2 30838 text extra gs-common_8.64~dfsg-1.1_all.deb
 c1cf9564b59d349b1bb7979737f1fbd1 2967238 doc optional ghostscript-doc_8.64~dfsg-1.1_all.deb
 ade92597066cd987a7d209f30d1d2bdd 770316 text optional ghostscript_8.64~dfsg-1.1_amd64.deb
 b81e7b7f7cb796b475237d1ac52d8c55 64714 text optional ghostscript-x_8.64~dfsg-1.1_amd64.deb
 4666898f5ed8171fd479d7993d50c893 2399198 libs optional libgs8_8.64~dfsg-1.1_amd64.deb
 645ec9793b135975b5873505a3814f83 38346 libdevel optional libgs-dev_8.64~dfsg-1.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAknuXAwACgkQHYflSXNkfP/PZgCcCJUOXQGeIYGgl9CWPgipjSqT
Cd8AoLcpA3a5GTwICRXJ+efN7aXf3Huf
=AVIk
-----END PGP SIGNATURE-----





Information forwarded to debian-bugs-dist@lists.debian.org, Masayuki Hatta (mhatta) <mhatta@debian.org>:
Bug#522416; Package ghostscript. (Wed, 22 Apr 2009 00:33:03 GMT) (full text, mbox, link).


Acknowledgement sent to Jonas Smedegaard <dr@jones.dk>:
Extra info received and forwarded to list. Copy sent to Masayuki Hatta (mhatta) <mhatta@debian.org>. (Wed, 22 Apr 2009 00:33:03 GMT) (full text, mbox, link).


Message #20 received at 522416@bugs.debian.org (full text, mbox, reply):

From: Jonas Smedegaard <dr@jones.dk>
To: Nico Golde <nion@debian.org>, 524915@bugs.debian.org
Cc: 522416@bugs.debian.org, 524803@bugs.debian.org
Subject: Re: Bug#524915: intent to NMU
Date: Wed, 22 Apr 2009 02:31:42 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, Apr 22, 2009 at 01:51:31AM +0200, Nico Golde wrote:
>Hi,
>attached is a patch that fixes the described issues which I 
>am going to upload as a 0-day NMU as there was no reaction 
>on these bugs yet.

Thanks a lot!  Your work is much appreciated.


  - Jonas

- -- 
* Jonas Smedegaard - idealist og Internet-arkitekt
* Tlf.: +45 40843136  Website: http://dr.jones.dk/

  [x] quote me freely  [ ] ask before reusing  [ ] keep private
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAknuZW4ACgkQn7DbMsAkQLgOyQCfe0Wgp1uQsZuixXBFc7A7VV/y
I7AAniSGIBqgO7x8vmU+jB2tiNpZkF3t
=2yrz
-----END PGP SIGNATURE-----




Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (Mon, 04 May 2009 18:03:15 GMT) (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (Mon, 04 May 2009 18:03:15 GMT) (full text, mbox, link).


Message #25 received at 522416-close@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 522416-close@bugs.debian.org
Subject: Bug#522416: fixed in ghostscript 8.64~dfsg-1+squeeze1
Date: Mon, 04 May 2009 17:47:33 +0000
Source: ghostscript
Source-Version: 8.64~dfsg-1+squeeze1

We believe that the bug you reported is fixed in the latest version of
ghostscript, which is due to be installed in the Debian FTP archive:

ghostscript-doc_8.64~dfsg-1+squeeze1_all.deb
  to pool/main/g/ghostscript/ghostscript-doc_8.64~dfsg-1+squeeze1_all.deb
ghostscript-x_8.64~dfsg-1+squeeze1_amd64.deb
  to pool/main/g/ghostscript/ghostscript-x_8.64~dfsg-1+squeeze1_amd64.deb
ghostscript_8.64~dfsg-1+squeeze1.diff.gz
  to pool/main/g/ghostscript/ghostscript_8.64~dfsg-1+squeeze1.diff.gz
ghostscript_8.64~dfsg-1+squeeze1.dsc
  to pool/main/g/ghostscript/ghostscript_8.64~dfsg-1+squeeze1.dsc
ghostscript_8.64~dfsg-1+squeeze1_amd64.deb
  to pool/main/g/ghostscript/ghostscript_8.64~dfsg-1+squeeze1_amd64.deb
gs-aladdin_8.64~dfsg-1+squeeze1_all.deb
  to pool/main/g/ghostscript/gs-aladdin_8.64~dfsg-1+squeeze1_all.deb
gs-common_8.64~dfsg-1+squeeze1_all.deb
  to pool/main/g/ghostscript/gs-common_8.64~dfsg-1+squeeze1_all.deb
gs-esp_8.64~dfsg-1+squeeze1_all.deb
  to pool/main/g/ghostscript/gs-esp_8.64~dfsg-1+squeeze1_all.deb
gs-gpl_8.64~dfsg-1+squeeze1_all.deb
  to pool/main/g/ghostscript/gs-gpl_8.64~dfsg-1+squeeze1_all.deb
gs_8.64~dfsg-1+squeeze1_all.deb
  to pool/main/g/ghostscript/gs_8.64~dfsg-1+squeeze1_all.deb
libgs-dev_8.64~dfsg-1+squeeze1_amd64.deb
  to pool/main/g/ghostscript/libgs-dev_8.64~dfsg-1+squeeze1_amd64.deb
libgs8_8.64~dfsg-1+squeeze1_amd64.deb
  to pool/main/g/ghostscript/libgs8_8.64~dfsg-1+squeeze1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 522416@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <nion@debian.org> (supplier of updated ghostscript package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 22 Apr 2009 00:19:51 +0200
Source: ghostscript
Binary: ghostscript gs gs-esp gs-gpl gs-aladdin gs-common ghostscript-x ghostscript-doc libgs8 libgs-dev
Architecture: source all amd64
Version: 8.64~dfsg-1+squeeze1
Distribution: testing-security
Urgency: high
Maintainer: Masayuki Hatta (mhatta) <mhatta@debian.org>
Changed-By: Nico Golde <nion@debian.org>
Description: 
 ghostscript - The GPL Ghostscript PostScript/PDF interpreter
 ghostscript-doc - The GPL Ghostscript PostScript/PDF interpreter - Documentation
 ghostscript-x - The GPL Ghostscript PostScript/PDF interpreter - X Display suppor
 gs         - Transitional package
 gs-aladdin - Transitional package
 gs-common  - Dummy package depending on ghostscript
 gs-esp     - Transitional package
 gs-gpl     - Transitional package
 libgs-dev  - The Ghostscript PostScript Library - Development Files
 libgs8     - The Ghostscript PostScript/PDF interpreter Library
Closes: 522416 524803 524915
Changes: 
 ghostscript (8.64~dfsg-1+squeeze1) testing-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * This update fixes various security issues:
     - CVE-2009-0792: multiple integer overflows in the icc library
       can cause a heap-based buffer overflow possibly leading to arbitray
       code execution.
     - CVE-2009-0584/CVE-2009-0583: Multiple integer overflows causing an
       application crash or possibly arbitrary code execution.
     - CVE-2009-0196: heap-based buffer overflow in big2_decode_symbol_dict()
       leading to arbitrary code execution via a crafted JBIG2 symbol
       dictionary segment.
       .
       (Closes: #524915, #522416, #524803)
Checksums-Sha1: 
 14f32b8d9f0d6c080fb9ab5b0dbe0c83d452af3e 1686 ghostscript_8.64~dfsg-1+squeeze1.dsc
 5bb48646a61d9453e5fa669d229a847136c8a680 11996078 ghostscript_8.64~dfsg.orig.tar.gz
 913cbe48f8d931f00968d8be58d56f7222340566 86715 ghostscript_8.64~dfsg-1+squeeze1.diff.gz
 cb910dc645de359b9f13a8e90ae1ba9a856d911c 30622 gs_8.64~dfsg-1+squeeze1_all.deb
 0205d82d28da9eda5b7f75e890a78e6be209b461 30618 gs-esp_8.64~dfsg-1+squeeze1_all.deb
 3fcbcb09f962e19874d28f61688b951a1ba56d02 30624 gs-gpl_8.64~dfsg-1+squeeze1_all.deb
 b0f2a16b66fe5f09412e05db57ac2b43d62bfff4 30630 gs-aladdin_8.64~dfsg-1+squeeze1_all.deb
 04b894385452935eebdde7e0b6b8749d481e6781 30884 gs-common_8.64~dfsg-1+squeeze1_all.deb
 b6365abfbb00d01c9d3b9114f85003a0640101b0 2964652 ghostscript-doc_8.64~dfsg-1+squeeze1_all.deb
 cdc5cab5ebf97796492541fcf5d39cd180463394 769912 ghostscript_8.64~dfsg-1+squeeze1_amd64.deb
 f7d778d1f20b7e307119f0616be377b9a096055b 64032 ghostscript-x_8.64~dfsg-1+squeeze1_amd64.deb
 bffa3343304c13c99a124f0b0b0a9868208039ee 2399554 libgs8_8.64~dfsg-1+squeeze1_amd64.deb
 f7c3486f9feb13599c6d5c6285e05b0cc88ab208 38320 libgs-dev_8.64~dfsg-1+squeeze1_amd64.deb
Checksums-Sha256: 
 c1b0b105c97e6519e799576b77ec122e1398ca68e1f0664ab6f1dd4994cb8fea 1686 ghostscript_8.64~dfsg-1+squeeze1.dsc
 cc856d33cb781cdc3383b8eb4e0f390997f8359fe144a906b84297b5d377f03d 11996078 ghostscript_8.64~dfsg.orig.tar.gz
 56f7f81acef3de7dcd242ff64a762840d59b05f1c16247047dfb6dd11b6a0983 86715 ghostscript_8.64~dfsg-1+squeeze1.diff.gz
 879dcaf08ca16d38a3bdbaa6ad825746075045fce6058dc682609bf1d4febc6e 30622 gs_8.64~dfsg-1+squeeze1_all.deb
 ee6930582ea9e8dc63dad0ea19f665fb557ea212dec2732e1c212a546fdf75e6 30618 gs-esp_8.64~dfsg-1+squeeze1_all.deb
 1b47ef59970e8ed3fa8c5b295c85d7778d54260225491a76a53b2c5bb7a03e1e 30624 gs-gpl_8.64~dfsg-1+squeeze1_all.deb
 4727d743dec40e284543eb485b747d863fd64a7d5dc4a3b5961988ece54974c2 30630 gs-aladdin_8.64~dfsg-1+squeeze1_all.deb
 c2a54af4b0f8371a9bd69256f3c360f3b997eab56b7c645443026fdee1dab797 30884 gs-common_8.64~dfsg-1+squeeze1_all.deb
 d855b88533b6f4f2d8fbd14eb75c8c2e6789e838c7b0fc9a96c2f18bf61b5fd5 2964652 ghostscript-doc_8.64~dfsg-1+squeeze1_all.deb
 0220ad7802e7e36bf4b2332bf8e9bdcbba74bc635c2c04757c1b9b2899007543 769912 ghostscript_8.64~dfsg-1+squeeze1_amd64.deb
 8fb3d594f4316e64749697a55b11601d8793d891cf8edf89ee8be595ca58f4d5 64032 ghostscript-x_8.64~dfsg-1+squeeze1_amd64.deb
 5d0a1eea0c034b170fcdfe71355d79341240f906dd4be3f8cb81b832734cecf2 2399554 libgs8_8.64~dfsg-1+squeeze1_amd64.deb
 4e0f12ff40de8f7a333a8f44ead78409822824c6ae96738be86068c121854578 38320 libgs-dev_8.64~dfsg-1+squeeze1_amd64.deb
Files: 
 f2487113efaedd0869b033e5dfd49cdd 1686 text optional ghostscript_8.64~dfsg-1+squeeze1.dsc
 e42706c2409815df5c959484080fd4a3 11996078 text optional ghostscript_8.64~dfsg.orig.tar.gz
 8317ffc09f923368e4305f025c6bfcd9 86715 text optional ghostscript_8.64~dfsg-1+squeeze1.diff.gz
 9e8022883ec4f35e22ac030fbd79a622 30622 text extra gs_8.64~dfsg-1+squeeze1_all.deb
 ff1f6644769114b644842cfb2456497f 30618 text extra gs-esp_8.64~dfsg-1+squeeze1_all.deb
 12c3bd09877de8c8fc2def9431d82d79 30624 text extra gs-gpl_8.64~dfsg-1+squeeze1_all.deb
 b295fb9a4d18c3ada094cd259f69cfe9 30630 text extra gs-aladdin_8.64~dfsg-1+squeeze1_all.deb
 20e9c0290d09dded49e1e0feccdc3368 30884 text extra gs-common_8.64~dfsg-1+squeeze1_all.deb
 10ed6579ecce2302b647bf7df16ef46c 2964652 doc optional ghostscript-doc_8.64~dfsg-1+squeeze1_all.deb
 61542d159ad18b46640761470dc85712 769912 text optional ghostscript_8.64~dfsg-1+squeeze1_amd64.deb
 9942a8959be5eb58fa12b4e6d2b0635e 64032 text optional ghostscript-x_8.64~dfsg-1+squeeze1_amd64.deb
 d1b5c3846dac054078fbb2548c216ae0 2399554 libs optional libgs8_8.64~dfsg-1+squeeze1_amd64.deb
 15158c213b74cab80a7c30bc4fbdc837 38320 libdevel optional libgs-dev_8.64~dfsg-1+squeeze1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkn0fsgACgkQHYflSXNkfP8SrgCgi6VY5Ec67mZn5zjuXwiAOpnC
5AAAnR7J/I4ycrFr8Xc4gvglnHj7deQ6
=B/Kg
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 02 Jun 2009 07:28:10 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:59:01 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.