Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 506352 (CVE-2014-0466) - <app-text/a2ps-4.14-r5: fixps does not invoke gs with -dSAFER (CVE-2014-0466)
Summary: <app-text/a2ps-4.14-r5: fixps does not invoke gs with -dSAFER (CVE-2014-0466)
Status: RESOLVED FIXED
Alias: CVE-2014-0466
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B2 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-31 09:42 UTC by Agostino Sarubbo
Modified: 2017-01-29 16:16 UTC (History)
2 users (show)

See Also:
Package list:
=app-text/a2ps-4.14-r5
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-03-31 09:42:42 UTC
From ${URL} :

brian m. carlson reported that a2ps's fixps script does not invoke gs with the -dSAFER option. Running 
fixps on a malicious PostScript file could result in files being deleted or arbitrary commands being 
executed with the privileges of the user running fixps.

A possible patch from Debian is available from the Debian bug: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=12;filename=a2ps-4.14-1.3-nmu.diff;att=1;bug=742902


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Agostino Sarubbo gentoo-dev 2014-04-04 09:39:45 UTC
CVE-2014-0466 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0466):

The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows 
context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted 
PostScript file.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2014-04-10 21:26:00 UTC
CVE-2014-0466 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0466):
  The fixps script in a2ps 4.14 does not use the -dSAFER option when executing
  gs, which allows context-dependent attackers to delete arbitrary files or
  execute arbitrary commands via a crafted PostScript file.
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-23 18:19:43 UTC
@ Maintainer(s): Upstream didn't work on the project since 2007. So let's add Debian's patch to get rid of this vulnerability. I prepared https://github.com/gentoo/gentoo/pull/2898 -- Please comment/approve/decline.
Comment 4 Aaron Bauman (RETIRED) gentoo-dev 2016-11-27 07:21:20 UTC
Merged:

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4a1d1e520fccdcff5c0ab5e69dfaf6df5abd0ff9

@maintainer(s), ready for stable?
Comment 5 Aaron Bauman (RETIRED) gentoo-dev 2016-11-30 03:47:44 UTC
@arches, please stabilize:

=app-text/a2ps-4.14-r5
Comment 6 Agostino Sarubbo gentoo-dev 2016-12-01 12:51:32 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2016-12-01 12:54:14 UTC
x86 stable
Comment 8 Tobias Klausmann (RETIRED) gentoo-dev 2016-12-02 14:21:33 UTC
Stable on alpha.
Comment 9 Markus Meier gentoo-dev 2017-01-08 18:26:25 UTC
arm stable
Comment 10 Agostino Sarubbo gentoo-dev 2017-01-11 10:36:45 UTC
sparc stable
Comment 11 Agostino Sarubbo gentoo-dev 2017-01-15 15:50:37 UTC
ppc stable
Comment 12 Agostino Sarubbo gentoo-dev 2017-01-17 14:25:03 UTC
ia64 stable
Comment 13 Agostino Sarubbo gentoo-dev 2017-01-18 10:03:11 UTC
ppc64 stable
Comment 14 Jeroen Roovers (RETIRED) gentoo-dev 2017-01-20 05:33:33 UTC
Stable for HPPA.
Comment 15 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-24 18:48:23 UTC
New GLSA request filed.
Comment 16 GLSAMaker/CVETool Bot gentoo-dev 2017-01-29 16:16:35 UTC
This issue was resolved and addressed in
 GLSA 201701-67 at https://security.gentoo.org/glsa/201701-67
by GLSA coordinator Thomas Deutschmann (whissi).