Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 300192 (CVE-2009-4270)

Summary: <app-text/ghostscript-gpl-8.71 Multiple vulnerabilities (CVE-2009-{3743,4270,4897},CVE-2010-4054)
Product: Gentoo Security Reporter: Alex Legler (RETIRED) <a3li>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: major    
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=540760
Whiteboard: A2 [glsa]
Package list:
Runtime testing required: ---
Bug Depends on: 264594    
Bug Blocks:    

Description Alex Legler (RETIRED) archtester gentoo-dev Security 2010-01-08 17:17:23 UTC
CVE-2009-4270 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4270):
  Stack-based buffer overflow in the errprintf function in
  base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote
  attackers to cause a denial of service (crash) and possibly execute
  arbitrary code via a crafted PDF file, as originally reported for
  debug logging code in gdevcups.c in the CUPS output driver.
Comment 1 Timo Gurr (RETIRED) gentoo-dev 2010-02-15 19:13:25 UTC
New upstream version app-text/ghostscript-gpl-8.71 in CVS (depends on ~testing libpng-1.2.42).
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2010-03-06 16:58:45 UTC
So 8.71 is ok to go stable?!
Comment 3 Timo Gurr (RETIRED) gentoo-dev 2010-03-07 17:14:07 UTC
I've just put -r1 into CVS which should be considered the stable candidate since it addresses most regressions 8.71 caused. Should be good to go stable in about 1-2 days.
Comment 4 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-10 14:42:14 UTC
CVE-2009-4897 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4897):
  Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier
  allows remote attackers to execute arbitrary code or cause a denial
  of service (memory corruption) via a crafted PDF document containing
  a long name.

Comment 5 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-08-11 20:35:48 UTC
GLSA request filed.
Comment 6 Andreas K. Hüttel archtester gentoo-dev 2011-06-02 19:23:29 UTC
No affected package in the tree anymore. 
Nothing left to do for printing.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 00:14:03 UTC
CVE-2009-3743 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3743):
  Off-by-one error in the Ins_MINDEX function in the TrueType bytecode
  interpreter in Ghostscript before 8.71 allows remote attackers to execute
  arbitrary code or cause a denial of service (heap memory corruption) via a
  malformed TrueType font in a document that trigger an integer overflow and a
  heap-based buffer overflow.
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 13:35:04 UTC
CVE-2010-4054 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4054):
  The gs_type2_interpret function in Ghostscript allows remote attackers to
  cause a denial of service (incorrect pointer dereference and application
  crash) via crafted font data in a compressed data stream, aka bug 691043.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2014-12-13 17:55:23 UTC
This issue was resolved and addressed in
 GLSA 201412-17 at http://security.gentoo.org/glsa/glsa-201412-17.xml
by GLSA coordinator Sean Amoss (ackle).