Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 618820 (CVE-2017-7948) - <app-text/ghostscript-gpl-9.25: Integer overflow in the mark_curve function (CVE-2017-7948)
Summary: <app-text/ghostscript-gpl-9.25: Integer overflow in the mark_curve function (...
Status: RESOLVED FIXED
Alias: CVE-2017-7948
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa+ cve]
Keywords:
Depends on: 634616 CVE-2017-9610, CVE-2017-9611, CVE-2017-9612, CVE-2017-9618, CVE-2017-9619, CVE-2017-9620, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739, CVE-2017-9740, CVE-2017-9835
Blocks:
  Show dependency tree
 
Reported: 2017-05-18 06:48 UTC by GLSAMaker/CVETool Bot
Modified: 2018-11-24 19:49 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2017-05-18 06:48:30 UTC
CVE-2017-7948 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7948):
  Integer overflow in the mark_curve function in Artifex Ghostscript 9.21
  allows remote attackers to cause a denial of service (out-of-bounds write
  and application crash) or possibly have unspecified other impact via a
  crafted PostScript document.
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2017-06-08 21:28:12 UTC
https://bugs.ghostscript.com/show_bug.cgi?id=697762
Comment 2 Andreas K. Hüttel archtester gentoo-dev 2017-06-09 22:58:19 UTC
This one is nontrivial to backport and NOT fixed in our 9.21 yet.

(The file in question is undergoing heavy changes and continuous bugfixing.)
Comment 3 Teika kazura 2018-04-15 03:34:19 UTC
According to the debian[1] bugzilla, this CVE entry was already fixed[3].

Yet, the last line of the debian tracker pages says:
 But the vulnerable code via base/gxscan.c, a new scan converter introduced in 9.20 is present.
I failed to find the current status.

According to the redhat[2] bugzilla, it seems this bug can be avoided by disabling one problematic scanner.

Notice that ghostscript-9.23 was already released in March.
  https://ghostscript.com/Ghostscript_9.23.html
There's no mention to the CVE entry in the upstream news and Changelog.

Could some review this issue? Thanks.

[1] https://security-tracker.debian.org/tracker/CVE-2017-7948
[2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7948
[3] https://bugs.ghostscript.com/show_bug.cgi?id=697762 (This link was already given in Comment #2)
    http://git.ghostscript.com/?p=ghostpdl.git;h=8210a2864372723b49c526e2b102fdc00c9c4699

Please also check bug 626418, which is another ghostscript 9.21 vulnereability, and has been neglected in spite of the fix.
Comment 4 Michael Boyle 2018-05-22 02:11:29 UTC
@maintainers, the fix is in the 9.22 version. Please bump.

Michael Boyle
Gentoo Security Padawan
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2018-11-24 19:49:10 UTC
This issue was resolved and addressed in
 GLSA 201811-12 at https://security.gentoo.org/glsa/201811-12
by GLSA coordinator Aaron Bauman (b-man).