diff --git a/debian/changelog b/debian/changelog index 80bfd2c38ef7497d74cadfd08844e3940e487a44..9523eeaa1023687c8f7d9cb9875e12dfebb39b0a 100644 --- a/debian/changelog +++ b/debian/changelog @@ -14,6 +14,13 @@ ghostscript (9.50~dfsg-ok5) yangtze; urgency=medium -- jiangdingyuan Wed, 02 Aug 2023 10:19:20 +0800 +ghostscript (9.50~dfsg-ok6) yangtze; urgency=medium + + * another-lin CVE-2020-16308 + + -- tangyi <2192724699@qq.com> Sun, 13 Aug 2023 15:40:33 +0800 + + ghostscript (9.50~dfsg-ok4) yangtze; urgency=medium * another-lin CVE-2020-16288 安全更新:修复缓冲区错误的漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等. diff --git a/devices/gdevcdj.c b/devices/gdevcdj.c index 8cf4e2e77f1bc853398370f59ecc86b29a59fa33..1ab1c202b114b15204072694c5f97d36428473c9 100644 --- a/devices/gdevcdj.c +++ b/devices/gdevcdj.c @@ -1969,7 +1969,7 @@ ep_print_image(gp_file *prn_stream, ep_globals *eg, char cmd, byte *data, int si /* p2 is the head of non zero image. */ p2 = p3; redo: - for (p3 += row_bytes; memcmp(p3, zeros, row_bytes); p3 += row_bytes); + for (p3 += row_bytes; p3 < outp && memcmp(p3, zeros, row_bytes); p3 += row_bytes); if (p3 < outp && memcmp(p3+row_bytes, zeros, row_bytes)) goto redo; } else p1 = p2 = outp;