[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#869916: marked as done (ghostscript: CVE-2017-9612: heap-use-after-free in Ins_IP(base/ttinterp.c))



Your message dated Sat, 30 Sep 2017 18:48:24 +0000
with message-id <E1dyMoK-0002fL-5u@fasolo.debian.org>
and subject line Bug#869916: fixed in ghostscript 9.20~dfsg-3.2+deb9u1
has caused the Debian Bug report #869916,
regarding ghostscript: CVE-2017-9612: heap-use-after-free in Ins_IP(base/ttinterp.c)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
869916: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: ghostscript
Version: 9.06~dfsg-2
Severity: important
Tags: patch security upstream fixed-upstream
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=698026

Hi,

the following vulnerability was published for ghostscript.

CVE-2017-9612[0]:
| The Ins_IP function in base/ttinterp.c in Artifex Ghostscript GhostXPS
| 9.22 allows remote attackers to cause a denial of service
| (use-after-free and application crash) or possibly have unspecified
| other impact via a crafted document.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-9612
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
[1] https://bugs.ghostscript.com/show_bug.cgi?id=698026
[2] http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=98f6da6

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: ghostscript
Source-Version: 9.20~dfsg-3.2+deb9u1

We believe that the bug you reported is fixed in the latest version of
ghostscript, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 869916@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated ghostscript package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 28 Sep 2017 21:47:33 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg
Architecture: source
Version: 9.20~dfsg-3.2+deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Debian Printing Team <debian-printing@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 869907 869910 869913 869915 869916 869917 869977
Description: 
 ghostscript - interpreter for the PostScript language and for PDF
 ghostscript-dbg - interpreter for the PostScript language and for PDF - Debug symbo
 ghostscript-doc - interpreter for the PostScript language and for PDF - Documentati
 ghostscript-x - interpreter for the PostScript language and for PDF - X11 support
 libgs-dev  - interpreter for the PostScript language and for PDF - Development
 libgs9     - interpreter for the PostScript language and for PDF - Library
 libgs9-common - interpreter for the PostScript language and for PDF - common file
Changes:
 ghostscript (9.20~dfsg-3.2+deb9u1) stretch-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Bounds check the array allocations methods (CVE-2017-9835)
     (Closes: #869907)
   * Bounds check zone pointer in Ins_MIRP() (CVE-2017-9611) (Closes: #869917)
   * Bounds check zone pointers in Ins_IP() (CVE-2017-9612) (Closes: #869916)
   * Bounds check zone pointer in Ins_MDRP (CVE-2017-9726) (Closes: #869915)
   * Make bounds check in gx_ttfReader__Read more robust (CVE-2017-9727)
     (Closes: #869913)
   * Bounds check Ins_JMPR (CVE-2017-9739) (Closes: #869910)
   * Prevent trying to reloc a freed object (CVE-2017-11714) (Closes: #869977)
Checksums-Sha1: 
 9e2afb408e26181f04dff55fff1fa750172cbdd1 3053 ghostscript_9.20~dfsg-3.2+deb9u1.dsc
 9489bf12392539b5ef063636419ea7248dbed423 24642220 ghostscript_9.20~dfsg.orig.tar.gz
 c6962ab5948bf6f3ed01ef2487f5296a1d8d1879 117452 ghostscript_9.20~dfsg-3.2+deb9u1.debian.tar.xz
Checksums-Sha256: 
 a66b365588b67d40f4d6928e25c786fa3fac9741ff04d90660d2dc25f438173f 3053 ghostscript_9.20~dfsg-3.2+deb9u1.dsc
 4b1cc33e4add4b5c62304a041896a176cf69e2a3702ca2ac3ee06b168787f911 24642220 ghostscript_9.20~dfsg.orig.tar.gz
 19c59eb694cee2c62d05d5da341744f8b983086366009c577e8a7103ca1ed27e 117452 ghostscript_9.20~dfsg-3.2+deb9u1.debian.tar.xz
Files: 
 84d2c19d494e08faff25ea77e15d14ed 3053 text optional ghostscript_9.20~dfsg-3.2+deb9u1.dsc
 d5fdc5f7b233c68d30d42a782535bdc0 24642220 text optional ghostscript_9.20~dfsg.orig.tar.gz
 2c15ecd32a5c13bb64f0833d503717d9 117452 text optional ghostscript_9.20~dfsg-3.2+deb9u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=9UZx
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: