ghostscript: CVE-2017-7207

Related Vulnerabilities: CVE-2017-7207  

Debian Bug report logs - #858350
ghostscript: CVE-2017-7207

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 21 Mar 2017 15:06:01 UTC

Severity: important

Tags: patch, security, upstream

Found in versions ghostscript/9.20~dfsg-1~exp1, ghostscript/9.06~dfsg-2

Fixed in version ghostscript/9.20~dfsg-3

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://bugs.ghostscript.com/show_bug.cgi?id=697676

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Printing Team <debian-printing@lists.debian.org>:
Bug#858350; Package src:ghostscript. (Tue, 21 Mar 2017 15:06:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Printing Team <debian-printing@lists.debian.org>. (Tue, 21 Mar 2017 15:06:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ghostscript: CVE-2017-7207
Date: Tue, 21 Mar 2017 16:02:24 +0100
Source: ghostscript
Version: 9.06~dfsg-2
Severity: important
Tags: patch security upstream
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=697676

Hi,

the following vulnerability was published for ghostscript.

CVE-2017-7207[0]:
| The mem_get_bits_rectangle function in Artifex Software, Inc.
| Ghostscript 9.20 allows remote attackers to cause a denial of service
| (NULL pointer dereference) via a crafted PostScript document.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7207
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Marked as found in versions ghostscript/9.20~dfsg-1~exp1. Request was from Jonas Smedegaard <dr@jones.dk> to control@bugs.debian.org. (Tue, 21 Mar 2017 16:30:03 GMT) (full text, mbox, link).


Marked as fixed in versions ghostscript/9.20~dfsg-3. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 23 Mar 2017 18:45:02 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 23 Mar 2017 18:45:03 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 23 Mar 2017 18:45:04 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#858350. (Thu, 23 Mar 2017 18:45:06 GMT) (full text, mbox, link).


Message #16 received at 858350-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 858350-submitter@bugs.debian.org
Subject: closing 858350
Date: Thu, 23 Mar 2017 19:40:22 +0100
# close the Debian Bug
close 858350 9.20~dfsg-3
thanks




Information forwarded to debian-bugs-dist@lists.debian.org, Debian Printing Team <debian-printing@lists.debian.org>:
Bug#858350; Package src:ghostscript. (Thu, 23 Mar 2017 20:27:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Printing Team <debian-printing@lists.debian.org>. (Thu, 23 Mar 2017 20:27:03 GMT) (full text, mbox, link).


Message #21 received at 858350@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Jonas Smedegaard <dr@jones.dk>, 858350@bugs.debian.org
Subject: Re: Bug#858350: ghostscript: CVE-2017-7207
Date: Thu, 23 Mar 2017 21:25:33 +0100
hi Jonas

Thanks for fixing CVE-2017-7207 in unstable. Can you ask as well
release team for an unblock, so that the fix goes to stretch?

Btw, there was a wrong bug closer for this bug (using the upstream bug
number instead), thus closed this one manually.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Printing Team <debian-printing@lists.debian.org>:
Bug#858350; Package src:ghostscript. (Thu, 23 Mar 2017 21:21:02 GMT) (full text, mbox, link).


Acknowledgement sent to Jonas Smedegaard <dr@jones.dk>:
Extra info received and forwarded to list. Copy sent to Debian Printing Team <debian-printing@lists.debian.org>. (Thu, 23 Mar 2017 21:21:02 GMT) (full text, mbox, link).


Message #26 received at 858350@bugs.debian.org (full text, mbox, reply):

From: Jonas Smedegaard <dr@jones.dk>
To: Salvatore Bonaccorso <carnil@debian.org>
Cc: 858350@bugs.debian.org
Subject: Re: Bug#858350: ghostscript: CVE-2017-7207
Date: Thu, 23 Mar 2017 22:17:37 +0100
[Message part 1 (text/plain, inline)]
Hi Salvatore,

Quoting Salvatore Bonaccorso (2017-03-23 21:25:33)
> Thanks for fixing CVE-2017-7207 in unstable. Can you ask as well 
> release team for an unblock, so that the fix goes to stretch?

Yes, I will try...


> Btw, there was a wrong bug closer for this bug (using the upstream bug 
> number instead), thus closed this one manually.

Ah, that's what happened.  I did notice your closing the bug I believed 
to already be closed.  Sorry for that!


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private
[signature.asc (application/pgp-signature, inline)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 28 Apr 2017 07:27:28 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:55:13 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.