Accepting request 501328 from Printing
- CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle see https://bugs.ghostscript.com/show_bug.cgi?id=697676 (bsc#1030263) - CVE-2017-9216.patch fixes a NULL pointer dereference in jbig2_huffman_get see https://bugs.ghostscript.com/show_bug.cgi?id=697934 (bsc#1040643) (forwarded request 501324 from dmolkentin) OBS-URL: https://build.opensuse.org/request/show/501328 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/ghostscript?expand=0&rev=28
This commit is contained in:
commit
b87a81b734
30
CVE-2017-7207.patch
Normal file
30
CVE-2017-7207.patch
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
From 309eca4e0a31ea70dcc844812691439312dad091 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Ken Sharp <ken.sharp@artifex.com>
|
||||||
|
Date: Mon, 20 Mar 2017 09:34:11 +0000
|
||||||
|
Subject: [PATCH] Ensure a device has raster memory, before trying to read it.
|
||||||
|
|
||||||
|
Bug #697676 "Null pointer dereference in mem_get_bits_rectangle()"
|
||||||
|
|
||||||
|
This is only possible by abusing/mis-using Ghostscript-specific
|
||||||
|
language extensions, so cannot happen in a general PostScript program.
|
||||||
|
|
||||||
|
Nevertheless, Ghostscript should not crash. So this commit checks the
|
||||||
|
memory device to see if raster memory has been allocated, before trying
|
||||||
|
to read from it.
|
||||||
|
---
|
||||||
|
base/gdevmem.c | 2 ++
|
||||||
|
1 file changed, 2 insertions(+)
|
||||||
|
|
||||||
|
Index: ghostscript-9.15/base/gdevmem.c
|
||||||
|
===================================================================
|
||||||
|
--- ghostscript-9.15.orig/base/gdevmem.c 2014-09-22 12:17:33.000000000 +0200
|
||||||
|
+++ ghostscript-9.15/base/gdevmem.c 2017-04-28 10:55:17.479490151 +0200
|
||||||
|
@@ -590,6 +590,8 @@ mem_get_bits_rectangle(gx_device * dev,
|
||||||
|
GB_PACKING_CHUNKY | GB_COLORS_NATIVE | GB_ALPHA_NONE;
|
||||||
|
return_error(gs_error_rangecheck);
|
||||||
|
}
|
||||||
|
+ if (mdev->line_ptrs == 0x00)
|
||||||
|
+ return_error(gs_error_rangecheck);
|
||||||
|
if ((w <= 0) | (h <= 0)) {
|
||||||
|
if ((w | h) < 0)
|
||||||
|
return_error(gs_error_rangecheck);
|
31
CVE-2017-9216.patch
Normal file
31
CVE-2017-9216.patch
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
From 3ebffb1d96ba0cacec23016eccb4047dab365853 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Shailesh Mistry <shailesh.mistry@hotmail.co.uk>
|
||||||
|
Date: Wed, 24 May 2017 19:29:57 +0100
|
||||||
|
Subject: [PATCH] Bug 697934: Fix SEGV due to error code being ignored.
|
||||||
|
|
||||||
|
The return code from jbig2_decode_text_region was being ignored so the
|
||||||
|
code continued to try and parse the invalid file using incomplete/empty
|
||||||
|
structures.
|
||||||
|
---
|
||||||
|
jbig2dec/jbig2_symbol_dict.c | 4 +++-
|
||||||
|
1 file changed, 3 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/jbig2dec/jbig2_symbol_dict.c b/jbig2dec/jbig2_symbol_dict.c
|
||||||
|
index 3cc17316f..672425d98 100644
|
||||||
|
--- a/jbig2dec/jbig2_symbol_dict.c
|
||||||
|
+++ b/jbig2dec/jbig2_symbol_dict.c
|
||||||
|
@@ -493,8 +493,10 @@ jbig2_decode_symbol_dict(Jbig2Ctx *ctx,
|
||||||
|
}
|
||||||
|
|
||||||
|
/* multiple symbols are handled as a text region */
|
||||||
|
- jbig2_decode_text_region(ctx, segment, tparams, (const Jbig2SymbolDict * const *)refagg_dicts,
|
||||||
|
+ code = jbig2_decode_text_region(ctx, segment, tparams, (const Jbig2SymbolDict * const *)refagg_dicts,
|
||||||
|
n_refagg_dicts, image, data, size, GR_stats, as, ws);
|
||||||
|
+ if (code < 0)
|
||||||
|
+ goto cleanup4;
|
||||||
|
|
||||||
|
SDNEWSYMS->glyphs[NSYMSDECODED] = image;
|
||||||
|
refagg_dicts[0]->glyphs[params->SDNUMINSYMS + NSYMSDECODED] = jbig2_image_clone(ctx, SDNEWSYMS->glyphs[NSYMSDECODED]);
|
||||||
|
--
|
||||||
|
2.12.3
|
||||||
|
|
@ -1,3 +1,13 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 2 09:12:45 UTC 2017 - daniel.molkentin@suse.com
|
||||||
|
|
||||||
|
- CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle
|
||||||
|
see https://bugs.ghostscript.com/show_bug.cgi?id=697676
|
||||||
|
(bsc#1030263)
|
||||||
|
- CVE-2017-9216.patch fixes a NULL pointer dereference in jbig2_huffman_get
|
||||||
|
see https://bugs.ghostscript.com/show_bug.cgi?id=697934
|
||||||
|
(bsc#1040643)
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue May 2 14:27:22 CEST 2017 - jsmeix@suse.de
|
Tue May 2 14:27:22 CEST 2017 - jsmeix@suse.de
|
||||||
|
|
||||||
|
@ -88,6 +88,15 @@ Patch101: CVE-2017-5951.patch
|
|||||||
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
||||||
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
||||||
Patch102: CVE-2017-8291.patch
|
Patch102: CVE-2017-8291.patch
|
||||||
|
# Patch103 fixes NULL pointer dereference in the jbig2_huffman_get function
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697934
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1040643
|
||||||
|
Patch103: CVE-2017-9216.patch
|
||||||
|
# Patch104 CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697676
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1030263
|
||||||
|
Patch104: CVE-2017-7207.patch
|
||||||
|
|
||||||
# RPM dependencies:
|
# RPM dependencies:
|
||||||
Conflicts: ghostscript
|
Conflicts: ghostscript
|
||||||
Conflicts: ghostscript-x11
|
Conflicts: ghostscript-x11
|
||||||
@ -183,7 +192,14 @@ rm -rf freetype jpeg libpng tiff
|
|||||||
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
||||||
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
||||||
%patch102 -p1 -b .CVE-2017-8291.orig
|
%patch102 -p1 -b .CVE-2017-8291.orig
|
||||||
|
# Patch103 fixes NULL pointer dereference in the jbig2_huffman_get function
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697934
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1040643
|
||||||
|
%patch103 -p1 -b .CVE-2017-9216.orig
|
||||||
|
# Patch104 CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697676
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1030263
|
||||||
|
%patch104 -p1 -b .CVE-2017-7207.orig
|
||||||
%build
|
%build
|
||||||
# Derive build timestamp from latest changelog entry
|
# Derive build timestamp from latest changelog entry
|
||||||
export SOURCE_DATE_EPOCH=$(date -d "$(head -n 2 %{_sourcedir}/%{name}.changes | tail -n 1 | cut -d- -f1 )" +%s)
|
export SOURCE_DATE_EPOCH=$(date -d "$(head -n 2 %{_sourcedir}/%{name}.changes | tail -n 1 | cut -d- -f1 )" +%s)
|
||||||
|
@ -1,3 +1,13 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Fri Jun 2 09:12:45 UTC 2017 - daniel.molkentin@suse.com
|
||||||
|
|
||||||
|
- CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle
|
||||||
|
see https://bugs.ghostscript.com/show_bug.cgi?id=697676
|
||||||
|
(bsc#1030263)
|
||||||
|
- CVE-2017-9216.patch fixes a NULL pointer dereference in jbig2_huffman_get
|
||||||
|
see https://bugs.ghostscript.com/show_bug.cgi?id=697934
|
||||||
|
(bsc#1040643)
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue May 2 14:27:22 CEST 2017 - jsmeix@suse.de
|
Tue May 2 14:27:22 CEST 2017 - jsmeix@suse.de
|
||||||
|
|
||||||
|
@ -108,6 +108,15 @@ Patch101: CVE-2017-5951.patch
|
|||||||
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
||||||
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
||||||
Patch102: CVE-2017-8291.patch
|
Patch102: CVE-2017-8291.patch
|
||||||
|
# Patch103 fixes NULL pointer dereference in the jbig2_huffman_get function
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697934
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1040643
|
||||||
|
Patch103: CVE-2017-9216.patch
|
||||||
|
# Patch104 CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697676
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1030263
|
||||||
|
Patch104: CVE-2017-7207.patch
|
||||||
|
|
||||||
# RPM dependencies:
|
# RPM dependencies:
|
||||||
# Additional RPM Provides of the ghostscript-library packages in openSUSE 11.4 from
|
# Additional RPM Provides of the ghostscript-library packages in openSUSE 11.4 from
|
||||||
# "rpm -q --provides ghostscript-library" and "rpm -q --provides ghostscript-x11":
|
# "rpm -q --provides ghostscript-library" and "rpm -q --provides ghostscript-x11":
|
||||||
@ -234,7 +243,6 @@ For information how to use Ghostscript see
|
|||||||
|
|
||||||
%package x11
|
%package x11
|
||||||
Summary: X11 library for Ghostscript
|
Summary: X11 library for Ghostscript
|
||||||
Group: Productivity/Publishing/PS
|
|
||||||
# Require the exact matching version-release of the ghostscript main-package because
|
# Require the exact matching version-release of the ghostscript main-package because
|
||||||
# a non-matching ghostscript main-package may let it fail or even crash (e.g. segfault)
|
# a non-matching ghostscript main-package may let it fail or even crash (e.g. segfault)
|
||||||
# because all Ghostscript software is built from one same Ghostscript source tar ball
|
# because all Ghostscript software is built from one same Ghostscript source tar ball
|
||||||
@ -242,6 +250,7 @@ Group: Productivity/Publishing/PS
|
|||||||
# The exact matching version-release of the ghostscript main-package is available
|
# The exact matching version-release of the ghostscript main-package is available
|
||||||
# on the same package repository where the ghostscript-x11 sub-package is because
|
# on the same package repository where the ghostscript-x11 sub-package is because
|
||||||
# all are built simulaneously from the same Ghostscript source package:
|
# all are built simulaneously from the same Ghostscript source package:
|
||||||
|
Group: Productivity/Publishing/PS
|
||||||
Requires: ghostscript = %{version}-%{release}
|
Requires: ghostscript = %{version}-%{release}
|
||||||
# Unfortunately ghostscript-library.spec and ghostscript-mini.spec have
|
# Unfortunately ghostscript-library.spec and ghostscript-mini.spec have
|
||||||
# an unversioned "Provides: ghostscript" and for RPM this means that both
|
# an unversioned "Provides: ghostscript" and for RPM this means that both
|
||||||
@ -319,6 +328,14 @@ rm -rf freetype jpeg libpng tiff
|
|||||||
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
# and https://bugs.ghostscript.com/show_bug.cgi?id=697799
|
||||||
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
# and https://bugzilla.opensuse.org/show_bug.cgi?id=1036453
|
||||||
%patch102 -p1 -b .CVE-2017-8291.orig
|
%patch102 -p1 -b .CVE-2017-8291.orig
|
||||||
|
# Patch103 fixes NULL pointer dereference in the jbig2_huffman_get function
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697934
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1040643
|
||||||
|
%patch103 -p1 -b .CVE-2017-9216.orig
|
||||||
|
# Patch104 CVE-2017-7207.patch fixes a NULL pointer dereference in mem_get_bits_rectangle
|
||||||
|
# see https://bugs.ghostscript.com/show_bug.cgi?id=697676
|
||||||
|
# and https://bugzilla.suse.com/show_bug.cgi?id=1030263
|
||||||
|
%patch104 -p1 -b .CVE-2017-7207.orig
|
||||||
|
|
||||||
%build
|
%build
|
||||||
# Derive build timestamp from latest changelog entry
|
# Derive build timestamp from latest changelog entry
|
||||||
|
Loading…
Reference in New Issue
Block a user