Summary: | <app-text/ghostscript-gpl-9.25: Integer overflow in the mark_curve function (CVE-2017-7948) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | printing |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa+ cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 634616, 635426 | ||
Bug Blocks: |
Description
GLSAMaker/CVETool Bot
2017-05-18 06:48:30 UTC
This one is nontrivial to backport and NOT fixed in our 9.21 yet. (The file in question is undergoing heavy changes and continuous bugfixing.) According to the debian[1] bugzilla, this CVE entry was already fixed[3]. Yet, the last line of the debian tracker pages says: But the vulnerable code via base/gxscan.c, a new scan converter introduced in 9.20 is present. I failed to find the current status. According to the redhat[2] bugzilla, it seems this bug can be avoided by disabling one problematic scanner. Notice that ghostscript-9.23 was already released in March. https://ghostscript.com/Ghostscript_9.23.html There's no mention to the CVE entry in the upstream news and Changelog. Could some review this issue? Thanks. [1] https://security-tracker.debian.org/tracker/CVE-2017-7948 [2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7948 [3] https://bugs.ghostscript.com/show_bug.cgi?id=697762 (This link was already given in Comment #2) http://git.ghostscript.com/?p=ghostpdl.git;h=8210a2864372723b49c526e2b102fdc00c9c4699 Please also check bug 626418, which is another ghostscript 9.21 vulnereability, and has been neglected in spite of the fix. @maintainers, the fix is in the 9.22 version. Please bump. Michael Boyle Gentoo Security Padawan This issue was resolved and addressed in GLSA 201811-12 at https://security.gentoo.org/glsa/201811-12 by GLSA coordinator Aaron Bauman (b-man). |