Errata ID | 436 |
---|---|
Date | 2017-07-05 |
Source package | ghostscript |
Fixed in version | 9.05~dfsg-6.3.34.201706271134 |
Description | This update addresses the following issues: * Ghostscript information disclosure through getenv, filenameforall (CVE-2013-5653) * Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write (CVE-2015-3228) * various userparams allow %pipe% in paths, allowing remote shell command execution (CVE-2016-7976) * .libfile doesn't check PermitFileReading array, allowing remote file disclosure (CVE-2016-7977) * reference leak in .setdevice allows use-after-free and remote code execution (CVE-2016-7978) * type confusion in .initialize_dsc_parser allows remote code execution (CVE-2016-7979) * type confusion (CVE-2016-8602) * Application crash with division by 0 in scan conversion code triggered through crafted content (CVE-2016-10219) * Application crash with a segfault in gx_device_finalize() triggered through crafted content (CVE-2016-10220) * Application crash with a segfault in ref_stack_index() triggered through crafted content (CVE-2017-5951) * Possible execution of arbitrary code or denial of service if a specially crafted Postscript file is processed (CVE-2017-8291) |
Additional notes | |
CVE ID | CVE-2013-5653 CVE-2015-3228 CVE-2016-7976 CVE-2016-7977 CVE-2016-7978 CVE-2016-7979 CVE-2016-8602 CVE-2016-10219 CVE-2016-10220 CVE-2017-5951 CVE-2017-8291 |
UCS Bug number | #39423 |