Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 618820 (CVE-2017-7948)

Summary: <app-text/ghostscript-gpl-9.25: Integer overflow in the mark_curve function (CVE-2017-7948)
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: printing
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [glsa+ cve]
Package list:
Runtime testing required: ---
Bug Depends on: 634616, 635426    
Bug Blocks:    

Description GLSAMaker/CVETool Bot gentoo-dev 2017-05-18 06:48:30 UTC
CVE-2017-7948 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7948):
  Integer overflow in the mark_curve function in Artifex Ghostscript 9.21
  allows remote attackers to cause a denial of service (out-of-bounds write
  and application crash) or possibly have unspecified other impact via a
  crafted PostScript document.
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2017-06-08 21:28:12 UTC
https://bugs.ghostscript.com/show_bug.cgi?id=697762
Comment 2 Andreas K. Hüttel archtester gentoo-dev 2017-06-09 22:58:19 UTC
This one is nontrivial to backport and NOT fixed in our 9.21 yet.

(The file in question is undergoing heavy changes and continuous bugfixing.)
Comment 3 Teika kazura 2018-04-15 03:34:19 UTC
According to the debian[1] bugzilla, this CVE entry was already fixed[3].

Yet, the last line of the debian tracker pages says:
 But the vulnerable code via base/gxscan.c, a new scan converter introduced in 9.20 is present.
I failed to find the current status.

According to the redhat[2] bugzilla, it seems this bug can be avoided by disabling one problematic scanner.

Notice that ghostscript-9.23 was already released in March.
  https://ghostscript.com/Ghostscript_9.23.html
There's no mention to the CVE entry in the upstream news and Changelog.

Could some review this issue? Thanks.

[1] https://security-tracker.debian.org/tracker/CVE-2017-7948
[2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7948
[3] https://bugs.ghostscript.com/show_bug.cgi?id=697762 (This link was already given in Comment #2)
    http://git.ghostscript.com/?p=ghostpdl.git;h=8210a2864372723b49c526e2b102fdc00c9c4699

Please also check bug 626418, which is another ghostscript 9.21 vulnereability, and has been neglected in spite of the fix.
Comment 4 Michael Boyle 2018-05-22 02:11:29 UTC
@maintainers, the fix is in the 9.22 version. Please bump.

Michael Boyle
Gentoo Security Padawan
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2018-11-24 19:49:10 UTC
This issue was resolved and addressed in
 GLSA 201811-12 at https://security.gentoo.org/glsa/201811-12
by GLSA coordinator Aaron Bauman (b-man).