View | Details | Raw Unified | Return to bug 202781 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+59 lines)
Lines 58-63 Link Here
58
58
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="fc1f6658-4f53-11e5-934b-002590263bf5">
62
    <topic>ghostscript -- denial of service (crash) via crafted Postscript files</topic>
63
    <affects>
64
      <package>
65
	<name>ghostscript7</name>
66
	<name>ghostscript7-nox11</name>
67
	<name>ghostscript7-base</name>
68
	<name>ghostscript7-x11</name>
69
	<range><lt>7.07_32</lt></range>
70
      </package>
71
      <package>
72
	<name>ghostscript8</name>
73
	<name>ghostscript8-nox11</name>
74
	<name>ghostscript8-base</name>
75
	<name>ghostscript8-x11</name>
76
	<range><lt>8.71_19</lt></range>
77
      </package>
78
      <package>
79
	<name>ghostscript9</name>
80
	<name>ghostscript9-nox11</name>
81
	<name>ghostscript9-base</name>
82
	<name>ghostscript9-x11</name>
83
	<range><lt>9.06_11</lt></range>
84
      </package>
85
      <package>
86
	<name>ghostscript9-agpl</name>
87
	<name>ghostscript9-agpl-nox11</name>
88
	<range><lt>9.15_2</lt></range>
89
      </package>
90
      <package>
91
	<name>ghostscript9-agpl-base</name>
92
	<name>ghostscript9-agpl-x11</name>
93
	<range><lt>9.16_2</lt></range>
94
      </package>
95
    </affects>
96
    <description>
97
      <body xmlns="http://www.w3.org/1999/xhtml">
98
	<p>MITRE reports:</p>
99
	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228">
100
	  <p>Integer overflow in the gs_heap_alloc_bytes function in
101
	    base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote
102
	    attackers to cause a denial of service (crash) via a crafted
103
	    Postscript (ps) file, as demonstrated by using the ps2pdf command,
104
	    which triggers an out-of-bounds read or write.</p>
105
	</blockquote>
106
      </body>
107
    </description>
108
    <references>
109
      <cvename>CVE-2015-3228</cvename>
110
      <url>http://bugs.ghostscript.com/show_bug.cgi?id=696041</url>
111
      <url>http://bugs.ghostscript.com/show_bug.cgi?id=696070</url>
112
      <url>http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=0c0b0859</url>
113
    </references>
114
    <dates>
115
      <discovery>2015-06-17</discovery>
116
      <entry>2015-08-30</entry>
117
    </dates>
118
  </vuln>
119
61
  <vuln vid="5300711b-4e61-11e5-9ad8-14dae9d210b8">
120
  <vuln vid="5300711b-4e61-11e5-9ad8-14dae9d210b8">
62
    <topic>graphviz -- format string vulnerability</topic>
121
    <topic>graphviz -- format string vulnerability</topic>
63
    <affects>
122
    <affects>

Return to bug 202781