Date: Mon, 20 Apr 2009 08:08:50 +0000 (UTC) From: Hiroki Sato <hrs@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/print/ghostscript8 Makefile ports/print/ghostscript8/files patch-CVE-2009-0583,0584 Message-ID: <200904200808.n3K88oQN093951@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
hrs 2009-04-20 08:08:50 UTC
FreeBSD ports repository
Modified files:
print/ghostscript8 Makefile
Added files:
print/ghostscript8/files patch-CVE-2009-0583,0584
Log:
Fix multiple integer overflows and lack of boundary check found
and marked as CVE-2009-583 and CVE-2009-584:
CVE-2009-583:
Multiple integer overflows in icc.c in the International Color
Consortium (ICC) Format library (aka icclib), as used in
Ghostscript 8.64 and earlier and Argyll Color Management
System (CMS) 1.0.3 and earlier, allow context-dependent
attackers to cause a denial of service (heap-based buffer
overflow and application crash) or possibly execute arbitrary
code by using a device file for a translation request that
operates on a crafted image file and targets a certain "native
color space," related to an ICC profile in a (1) PostScript
or (2) PDF file with embedded images.
CVE-2009-584:
icc.c in the International Color Consortium (ICC) Format
library (aka icclib), as used in Ghostscript 8.64 and earlier
and Argyll Color Management System (CMS) 1.0.3 and earlier,
allows context-dependent attackers to cause a denial of
service (application crash) or possibly execute arbitrary code
by using a device file for processing a crafted image file
associated with large integer values for certain sizes, related
to an ICC profile in a (1) PostScript or (2) PDF file with
embedded images.
Security: CVE-2009-583
Security: CVE-2009-584
Approved by: portmgr (pav)
Revision Changes Path
1.180 +1 -1 ports/print/ghostscript8/Makefile
1.1 +989 -0 ports/print/ghostscript8/files/patch-CVE-2009-0583,0584 (new)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200904200808.n3K88oQN093951>
