Bug 646086 (CVE-2010-4054)

Summary: CVE-2010-4054 ghostscript: glyph data access improper input validation
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: lijli, praiskup, rcvalle, twaugh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-02-02 22:49:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 647405, 760157, 760158, 760159, 760160, 760161    
Bug Blocks: 733386, 806689    

Description Jan Lieskovsky 2010-10-24 10:25:27 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4054 to
the following vulnerability:

The gs_type2_interpret function in Ghostscript allows remote attackers
to cause a denial of service (incorrect pointer dereference and
application crash) via crafted font data in a compressed data stream,
aka bug 691043.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054
[2] http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html
[3] http://www.kb.cert.org/vuls/id/538191

Upstream bug report:
[4] http://bugs.ghostscript.com/show_bug.cgi?id=691043

Comment 2 Jan Lieskovsky 2010-10-24 10:33:43 UTC
This issue affects the versions of the ghostscript package, as shipped
with Red Hat Enterprise Linux 3, 4, and 5.

--

This issue affects the version of the ghostscript package, as shipped
with Fedora release of 12.

This issue does not affect the version of the ghostscript package, as
shipped with Fedora release of 13 (updated ghostscript package is already
present in Fedora 13 -testing repository and will shortly reach -stable
branch).

Comment 4 Huzaifa S. Sidhpurwala 2010-10-28 09:17:38 UTC
Created ghostscript tracking bugs for this issue

Affects: fedora-12 [bug 647405]

Comment 5 Tim Waugh 2010-10-28 09:57:59 UTC
Looks to me like Fedora 12 has not been affected since February, which is when it was updated to 8.71.

Comment 14 errata-xmlrpc 2012-02-02 22:33:10 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2012:0096 https://rhn.redhat.com/errata/RHSA-2012-0096.html

Comment 15 errata-xmlrpc 2012-02-02 22:45:47 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2012:0095 https://rhn.redhat.com/errata/RHSA-2012-0095.html

Comment 16 Vincent Danen 2012-02-02 22:49:51 UTC
Statement:

(none)