Bug 1444944 (CVE-2017-7948) - CVE-2017-7948 ghostscript: Integer overflow in the mark_curve function
Summary: CVE-2017-7948 ghostscript: Integer overflow in the mark_curve function
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-7948
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1444945
Blocks: 1444946
TreeView+ depends on / blocked
 
Reported: 2017-04-24 15:10 UTC by Adam Mariš
Modified: 2021-02-17 02:13 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-06-27 16:13:31 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-04-24 15:10:32 UTC
Integer overflow in the mark_curve function in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via a crafted PostScript document.

Upstream bug:

https://bugs.ghostscript.com/show_bug.cgi?id=697762

Upstream patch:

http://git.ghostscript.com/?p=ghostpdl.git;h=8210a2864372723b49c526e2b102fdc00c9c4699

Comment 1 Adam Mariš 2017-04-24 15:11:11 UTC
Created ghostscript tracking bugs for this issue:

Affects: fedora-all [bug 1444945]

Comment 5 Stefan Cornelius 2017-06-27 16:11:54 UTC
I can't reproduce this issue. It looks like this bug was introduced when adding a new scanner via http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=18ef67078eb63103ed5e0de627296cb86f493d42

The ghostscript versions we ship do not include this new scanner, thus should be unaffected by it.

Comment 6 Stefan Cornelius 2017-06-27 16:12:06 UTC
Statement:

This issue did not affect the versions of ghostscript as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue did not affect the versions of ghostscript as shipped with OpenShift Enterprise 2.


Note You need to log in before you can comment on or make changes to this bug.