Bug 39423 - ghostscript: Integeroverflow (4.1)
ghostscript: Integeroverflow (4.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.1
Other Linux
: P4 normal (vote)
: UCS 4.1-4-errata
Assigned To: Arvid Requate
Janek Walkenhorst
:
Depends on: 44569
Blocks: 42569
  Show dependency treegraph
 
Reported: 2015-09-28 18:21 CEST by Arvid Requate
Modified: 2017-10-26 13:53 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2015-09-28 18:21:11 CEST
This security issue is fixed in upstream Debian package version 9.05~dfsg-6.3+deb7u2:

* Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write (CVE-2015-3228)
Comment 1 Arvid Requate univentionstaff 2016-10-13 17:04:38 CEST
The following issues have been reported as fixed in the Debian Jessie package version (9.06~dfsg-2+deb8u3):

* Ghostscript information disclosure through getenv, filenameforall (CVE-2013-5653)
* various userparams allow %pipe% in paths, allowing remote shell command execution (CVE-2016-7976)
* .libfile doesn't check PermitFileReading array, allowing remote file disclosure (CVE-2016-7977)
* reference leak in .setdevice allows use-after-free and remote code execution (CVE-2016-7978)
* type confusion in .initialize_dsc_parser allows remote code execution (CVE-2016-7979)
* type confusion (CVE-2016-8602)
Comment 2 Arvid Requate univentionstaff 2016-11-05 19:56:34 CET
An updated Wheezy package is also available: 9.05~dfsg-6.3+deb7u3
Comment 3 Arvid Requate univentionstaff 2016-11-08 19:04:23 CET
Regression fix: 9.05~dfsg-6.3+deb7u4
Comment 4 Arvid Requate univentionstaff 2017-05-10 13:00:49 CEST
Upstream Debian package version 9.05~dfsg-6.3+deb7u5 fixes these issues:

* Application crash with division by 0 in scan conversion code triggered through crafted content (CVE-2016-10219)

* Application crash with a segfault in gx_device_finalize() triggered through crafted content (CVE-2016-10220)

* Application crash with a segfault in ref_stack_index() triggered through crafted content (CVE-2017-5951)
Comment 5 Arvid Requate univentionstaff 2017-05-10 13:03:11 CEST
Upstream Debian package version 9.05~dfsg-6.3+deb7u6 fixes this issue:

* Possible execution of arbitrary code or denial of service if a specially crafted Postscript file is processed (CVE-2017-8291)
Comment 6 Arvid Requate univentionstaff 2017-05-10 13:28:55 CEST
FTBFS:

devlibs error: There is no package matching [libgssapi3-dev] and noone provides it, please report bug to d-shlibs maintainer
Comment 7 Philipp Hahn univentionstaff 2017-06-27 11:36:32 CEST
r17558 | Bug #39423: Fix build with heimdal
Comment 8 Philipp Hahn univentionstaff 2017-06-27 11:36:41 CEST
Package: ghostscript
Version: 9.05~dfsg-6.3.34.201706271134
Branch: ucs_4.1-0
Scope: errata4.1-4
Comment 9 Arvid Requate univentionstaff 2017-06-28 13:54:15 CEST
Advisory: ghostscript.yaml
Comment 10 Janek Walkenhorst univentionstaff 2017-07-04 16:30:44 CEST
Tests (amd64): OK
Advisory: OK
Comment 11 Janek Walkenhorst univentionstaff 2017-07-05 13:32:15 CEST
<http://errata.software-univention.de/ucs/4.1/436.html>