File _patchinfo of Package patchinfo.4931
<patchinfo incident="4931">
<issue id="1040643" tracker="bnc">VUL-0: CVE-2017-9216: ghostscript: NULL pointer dereference in the jbig2_huffman_get function</issue>
<issue id="1032138" tracker="bnc">VUL-1: CVE-2016-10219: ghostscript,ghostscript-library: The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript9.20 allows remote att...</issue>
<issue id="1032230" tracker="bnc">VUL-0: CVE-2016-10317: ghostscript: The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software,Inc. Ghostscript 9.20...</issue>
<issue id="1050887" tracker="bnc">VUL-0: CVE-2017-9739: ghostscript: heap-based buffer over-read in Ins_JMPR in base/ttinterp.c</issue>
<issue id="1050888" tracker="bnc">VUL-0: CVE-2017-9727: ghostscript, ghostscript-library: heap-based buffer over-read in gx_ttfReader__Read in base/gxttfb.c</issue>
<issue id="1050889" tracker="bnc">VUL-0: CVE-2017-9726: ghostscript, ghostscript-library: heap-based buffer over-read in Ins_MDRP in base/ttinterp.c</issue>
<issue id="1050891" tracker="bnc">VUL-0: CVE-2017-9612: ghostscript, ghostscript-library: use-after-free in Ins_IP function in base/ttinterp.c</issue>
<issue id="1051184" tracker="bnc">VUL-0: CVE-2017-11714: ghostscript, ghostscript-library: Out of bounds read in igc_reloc_struct_ptr()</issue>
<issue id="1050879" tracker="bnc">VUL-0: CVE-2017-9835: ghostscript, ghostscript-library: heap-based buffer overflow in gs_alloc_ref_array in psi/ialloc.c</issue>
<issue id="2017-9835" tracker="cve" />
<issue id="2016-10219" tracker="cve" />
<issue id="2016-10317" tracker="cve" />
<issue id="2017-11714" tracker="cve" />
<issue id="2017-9612" tracker="cve" />
<issue id="2017-9726" tracker="cve" />
<issue id="2017-9727" tracker="cve" />
<issue id="2017-9739" tracker="cve" />
<issue id="2017-9216" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>dmolkentin</packager>
<description>This update for ghostscript fixes several issues.
These security issues were fixed:
- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
cause a denial of service (heap-based buffer overflow and application crash) or
possibly have unspecified other impact via a crafted PostScript document
(bsc#1050879).
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
function in jbig2_huffman.c which allowed for DoS (bsc#1040643).
- CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c
allowed remote attackers to cause a denial of service (heap-based buffer
overflow and application crash) or possibly have unspecified other impact via a
crafted PostScript document (bsc#1032230).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
attackers to cause a denial of service (use-after-free and application crash)
or possibly have unspecified other impact via a crafted document (bsc#1050891).
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
attackers to cause a denial of service (heap-based buffer over-read and
application crash) or possibly have unspecified other impact via a crafted
document (bsc#1050889).
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
remote attackers to cause a denial of service (heap-based buffer over-read and
application crash) or possibly have unspecified other impact via a crafted
document (bsc#1050888).
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
attackers to cause a denial of service (heap-based buffer over-read and
application crash) or possibly have unspecified other impact via a crafted
document (bsc#1050887).
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
structure, which allowed remote attackers to cause a denial of service
(application crash) or possibly have unspecified other impact via a crafted
PostScript document, related to an out-of-bounds read in the
igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
attackers to cause a denial of service (divide-by-zero error and application
crash) via a crafted file (bsc#1032138).
</description>
<summary>Security update for ghostscript</summary>
</patchinfo>