Summary: | <app-text/ghostscript-gpl-8.64-r3 jbig2dec JBIG2 Buffer Overflow / ICC Integer overflow (CVE-2009-{0196,0792}) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | normal | CC: | hanno, please.no.spam.here, pva | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | B2 [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Bug Depends on: | |||||||
Bug Blocks: | 300192 | ||||||
Attachments: |
|
Description
Robert Buchholz (RETIRED)
![]() Created attachment 187058 [details, diff]
CVE-2009-0196.patch
ghostscript-gpl upstream patch
CVE-2009-0792 -- another integer overflow has been reported. Let's wait on this bug until we have a final patch. this is public via https://rhn.redhat.com/errata/RHSA-2009-0421.html *** Bug 265955 has been marked as a duplicate of this bug. *** CVE-2009-0196 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0196): Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value. I've just committed ghostscript-gpl-8.64-r3 which applies the patches for both CVE's. The patch tarball could take a few minutes to hit the mirror(s) though. cc-ing archs. Stable for HPPA. ppc64 done ppc done x86 stable alpha/arm/ia64/s390/sh/sparc stable (In reply to comment #6) > I've just committed ghostscript-gpl-8.64-r3 which applies the patches for both > CVE's. The patch tarball could take a few minutes to hit the mirror(s) though. What about ghostscript-gnu? Is that affected as well? I see that upstream already released 8.64.0; does that fix the issue by chance? amd64 stable, all arches done. GLSA together with bug 300192. No affected package left in the tree. Nothing to do for printing anymore. This issue was resolved and addressed in GLSA 201412-17 at http://security.gentoo.org/glsa/glsa-201412-17.xml by GLSA coordinator Sean Amoss (ackle). |