CVE-2017-7948 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7948): Integer overflow in the mark_curve function in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via a crafted PostScript document.
https://bugs.ghostscript.com/show_bug.cgi?id=697762
This one is nontrivial to backport and NOT fixed in our 9.21 yet. (The file in question is undergoing heavy changes and continuous bugfixing.)
According to the debian[1] bugzilla, this CVE entry was already fixed[3]. Yet, the last line of the debian tracker pages says: But the vulnerable code via base/gxscan.c, a new scan converter introduced in 9.20 is present. I failed to find the current status. According to the redhat[2] bugzilla, it seems this bug can be avoided by disabling one problematic scanner. Notice that ghostscript-9.23 was already released in March. https://ghostscript.com/Ghostscript_9.23.html There's no mention to the CVE entry in the upstream news and Changelog. Could some review this issue? Thanks. [1] https://security-tracker.debian.org/tracker/CVE-2017-7948 [2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7948 [3] https://bugs.ghostscript.com/show_bug.cgi?id=697762 (This link was already given in Comment #2) http://git.ghostscript.com/?p=ghostpdl.git;h=8210a2864372723b49c526e2b102fdc00c9c4699 Please also check bug 626418, which is another ghostscript 9.21 vulnereability, and has been neglected in spite of the fix.
@maintainers, the fix is in the 9.22 version. Please bump. Michael Boyle Gentoo Security Padawan
This issue was resolved and addressed in GLSA 201811-12 at https://security.gentoo.org/glsa/201811-12 by GLSA coordinator Aaron Bauman (b-man).