Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 300192 (CVE-2009-4270) - <app-text/ghostscript-gpl-8.71 Multiple vulnerabilities (CVE-2009-{3743,4270,4897},CVE-2010-4054)
Summary: <app-text/ghostscript-gpl-8.71 Multiple vulnerabilities (CVE-2009-{3743,4270,...
Status: RESOLVED FIXED
Alias: CVE-2009-4270
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A2 [glsa]
Keywords:
Depends on: CVE-2009-0196
Blocks:
  Show dependency tree
 
Reported: 2010-01-08 17:17 UTC by Alex Legler (RETIRED)
Modified: 2014-12-13 17:55 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2010-01-08 17:17:23 UTC
CVE-2009-4270 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4270):
  Stack-based buffer overflow in the errprintf function in
  base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote
  attackers to cause a denial of service (crash) and possibly execute
  arbitrary code via a crafted PDF file, as originally reported for
  debug logging code in gdevcups.c in the CUPS output driver.
Comment 1 Timo Gurr (RETIRED) gentoo-dev 2010-02-15 19:13:25 UTC
New upstream version app-text/ghostscript-gpl-8.71 in CVS (depends on ~testing libpng-1.2.42).
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2010-03-06 16:58:45 UTC
So 8.71 is ok to go stable?!
Comment 3 Timo Gurr (RETIRED) gentoo-dev 2010-03-07 17:14:07 UTC
I've just put -r1 into CVS which should be considered the stable candidate since it addresses most regressions 8.71 caused. Should be good to go stable in about 1-2 days.
Comment 4 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-10 14:42:14 UTC
CVE-2009-4897 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4897):
  Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier
  allows remote attackers to execute arbitrary code or cause a denial
  of service (memory corruption) via a crafted PDF document containing
  a long name.

Comment 5 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-11 20:35:48 UTC
GLSA request filed.
Comment 6 Andreas K. Hüttel archtester gentoo-dev 2011-06-02 19:23:29 UTC
No affected package in the tree anymore. 
Nothing left to do for printing.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 00:14:03 UTC
CVE-2009-3743 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3743):
  Off-by-one error in the Ins_MINDEX function in the TrueType bytecode
  interpreter in Ghostscript before 8.71 allows remote attackers to execute
  arbitrary code or cause a denial of service (heap memory corruption) via a
  malformed TrueType font in a document that trigger an integer overflow and a
  heap-based buffer overflow.
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 13:35:04 UTC
CVE-2010-4054 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4054):
  The gs_type2_interpret function in Ghostscript allows remote attackers to
  cause a denial of service (incorrect pointer dereference and application
  crash) via crafted font data in a compressed data stream, aka bug 691043.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2014-12-13 17:55:23 UTC
This issue was resolved and addressed in
 GLSA 201412-17 at http://security.gentoo.org/glsa/glsa-201412-17.xml
by GLSA coordinator Sean Amoss (ackle).