diff mbox series

[kirkstone] ghostscript: ignore CVE-2020-36773

Message ID 20240208064030.118190-1-vanusuri@mvista.com
State Changes Requested
Delegated to: Steve Sakoman
Headers show
Series [kirkstone] ghostscript: ignore CVE-2020-36773 | expand

Commit Message

Vijay Anusuri Feb. 8, 2024, 6:40 a.m. UTC
From: Vijay Anusuri <vanusuri@mvista.com>

Artifex Ghostscript before 9.53.0 has an out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single character code in a PDF document can map to more than one Unicode code point (e.g., for a ligature).

Reference: https://ubuntu.com/security/CVE-2020-36773

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
---
 meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | 4 ++++
 1 file changed, 4 insertions(+)

Comments

Steve Sakoman Feb. 8, 2024, 3:09 p.m. UTC | #1
On Wed, Feb 7, 2024 at 8:42 PM Vijay Anusuri via
lists.openembedded.org <vanusuri=mvista.com@lists.openembedded.org>
wrote:
>
> From: Vijay Anusuri <vanusuri@mvista.com>
>
> Artifex Ghostscript before 9.53.0 has an out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single character code in a PDF document can map to more than one Unicode code point (e.g., for a ligature).
>
> Reference: https://ubuntu.com/security/CVE-2020-36773
>
> Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
> ---
>  meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | 4 ++++
>  1 file changed, 4 insertions(+)
>
> diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> index e0d1e4618f..cc06d092c1 100644
> --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> @@ -26,6 +26,10 @@ CVE_CHECK_IGNORE += "CVE-2013-6629"
>  # Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe.
>  CVE_CHECK_IGNORE += "CVE-2023-38560"
>
> +# This CVE affects Ghostscript before 9.53.0
> +# https://ubuntu.com/security/CVE-2020-36773
> +CVE_CHECK_IGNORE += "CVE-2020-36773"

When there is an error in the upstream database it is preferred that
you send an email to cpe_dictionary@nist.gov requesting an update
(giving links that justify the change to make it easy for them to
research)

They are usually quite responsive, and this is much preferred to
carrying an IGNORE in our metadata.

Thanks!

Steve

> +
>  def gs_verdir(v):
>      return "".join(v.split("."))
>
> --
> 2.25.1
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#195101): https://lists.openembedded.org/g/openembedded-core/message/195101
> Mute This Topic: https://lists.openembedded.org/mt/104234914/3620601
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [steve@sakoman.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
Vijay Anusuri March 4, 2024, 1:49 a.m. UTC | #2
Hi Steve,

I've sent mail to cpe_dictionary@nist.gov to update the information.

Now it was updated in https://nvd.nist.gov/vuln/detail/CVE-2020-36773

Thanks & Regards,
Vijay

On Thu, Feb 8, 2024 at 8:40 PM Steve Sakoman <steve@sakoman.com> wrote:

> On Wed, Feb 7, 2024 at 8:42 PM Vijay Anusuri via
> lists.openembedded.org <vanusuri=mvista.com@lists.openembedded.org>
> wrote:
> >
> > From: Vijay Anusuri <vanusuri@mvista.com>
> >
> > Artifex Ghostscript before 9.53.0 has an out-of-bounds write and
> use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single
> character code in a PDF document can map to more than one Unicode code
> point (e.g., for a ligature).
> >
> > Reference: https://ubuntu.com/security/CVE-2020-36773
> >
> > Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
> > ---
> >  meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | 4 ++++
> >  1 file changed, 4 insertions(+)
> >
> > diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> > index e0d1e4618f..cc06d092c1 100644
> > --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> > +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
> > @@ -26,6 +26,10 @@ CVE_CHECK_IGNORE += "CVE-2013-6629"
> >  # Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe.
> >  CVE_CHECK_IGNORE += "CVE-2023-38560"
> >
> > +# This CVE affects Ghostscript before 9.53.0
> > +# https://ubuntu.com/security/CVE-2020-36773
> > +CVE_CHECK_IGNORE += "CVE-2020-36773"
>
> When there is an error in the upstream database it is preferred that
> you send an email to cpe_dictionary@nist.gov requesting an update
> (giving links that justify the change to make it easy for them to
> research)
>
> They are usually quite responsive, and this is much preferred to
> carrying an IGNORE in our metadata.
>
> Thanks!
>
> Steve
>
> > +
> >  def gs_verdir(v):
> >      return "".join(v.split("."))
> >
> > --
> > 2.25.1
> >
> >
> > -=-=-=-=-=-=-=-=-=-=-=-
> > Links: You receive all messages sent to this group.
> > View/Reply Online (#195101):
> https://lists.openembedded.org/g/openembedded-core/message/195101
> > Mute This Topic: https://lists.openembedded.org/mt/104234914/3620601
> > Group Owner: openembedded-core+owner@lists.openembedded.org
> > Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [
> steve@sakoman.com]
> > -=-=-=-=-=-=-=-=-=-=-=-
> >
>
Good afternoon,

We apologize for the late response as we are currently experiencing a large volume of CPE related inquiries.

Thank you for bringing this to our attention. We appreciate community input in order to provide the most accurate and up-to-date information as possible. After reviewing publicly available information we have made the appropriate modifications.  Please allow up to 24 hours for the changes to be reflected on the website and in the data feeds.


V/r,

Common Platform Enumeration Team

National Institute of Standards and Technology (NIST)

cpe_dictionary@nist.gov<mailto:cpe_dictionary@nist.gov>


From: Vijay Anusuri <vanusuri@mvista.com>
Sent: Thursday, February 8, 2024 10:52 PM
To: cpe_dictionary <cpe_dictionary@nist.gov>
Subject: CVE-2020-36773 update

Hi Team,

CVE-2020-36773 was fixed in the Ghostscript version 9.53.0 by the below commit
https://git.ghostscript.com/?p=ghostpdl.git;h=8c7bd787defa071c96289b7da9397f673fddb874

This issue introduced in 9.51 as described in the patch.

Affected versions: 9.51 & 9.52
References: https://ghostscript.com/docs/9.53.3/History9.htm
                    https://ubuntu.com/security/CVE-2020-36773

Could you please update this in upstream database.

Thanks & Regards,
Vijay
Steve Sakoman March 7, 2024, 3:21 p.m. UTC | #3
On Sun, Mar 3, 2024 at 3:50 PM Vijay Anusuri <vanusuri@mvista.com> wrote:
>
> Hi Steve,
>
> I've sent mail to cpe_dictionary@nist.gov to update the information.
>
> Now it was updated in https://nvd.nist.gov/vuln/detail/CVE-2020-36773

Thanks!

Steve

> On Thu, Feb 8, 2024 at 8:40 PM Steve Sakoman <steve@sakoman.com> wrote:
>>
>> On Wed, Feb 7, 2024 at 8:42 PM Vijay Anusuri via
>> lists.openembedded.org <vanusuri=mvista.com@lists.openembedded.org>
>> wrote:
>> >
>> > From: Vijay Anusuri <vanusuri@mvista.com>
>> >
>> > Artifex Ghostscript before 9.53.0 has an out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single character code in a PDF document can map to more than one Unicode code point (e.g., for a ligature).
>> >
>> > Reference: https://ubuntu.com/security/CVE-2020-36773
>> >
>> > Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
>> > ---
>> >  meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | 4 ++++
>> >  1 file changed, 4 insertions(+)
>> >
>> > diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
>> > index e0d1e4618f..cc06d092c1 100644
>> > --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
>> > +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
>> > @@ -26,6 +26,10 @@ CVE_CHECK_IGNORE += "CVE-2013-6629"
>> >  # Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe.
>> >  CVE_CHECK_IGNORE += "CVE-2023-38560"
>> >
>> > +# This CVE affects Ghostscript before 9.53.0
>> > +# https://ubuntu.com/security/CVE-2020-36773
>> > +CVE_CHECK_IGNORE += "CVE-2020-36773"
>>
>> When there is an error in the upstream database it is preferred that
>> you send an email to cpe_dictionary@nist.gov requesting an update
>> (giving links that justify the change to make it easy for them to
>> research)
>>
>> They are usually quite responsive, and this is much preferred to
>> carrying an IGNORE in our metadata.
>>
>> Thanks!
>>
>> Steve
>>
>> > +
>> >  def gs_verdir(v):
>> >      return "".join(v.split("."))
>> >
>> > --
>> > 2.25.1
>> >
>> >
>> > -=-=-=-=-=-=-=-=-=-=-=-
>> > Links: You receive all messages sent to this group.
>> > View/Reply Online (#195101): https://lists.openembedded.org/g/openembedded-core/message/195101
>> > Mute This Topic: https://lists.openembedded.org/mt/104234914/3620601
>> > Group Owner: openembedded-core+owner@lists.openembedded.org
>> > Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [steve@sakoman.com]
>> > -=-=-=-=-=-=-=-=-=-=-=-
>> >
diff mbox series

Patch

diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
index e0d1e4618f..cc06d092c1 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
@@ -26,6 +26,10 @@  CVE_CHECK_IGNORE += "CVE-2013-6629"
 # Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe.
 CVE_CHECK_IGNORE += "CVE-2023-38560"
 
+# This CVE affects Ghostscript before 9.53.0
+# https://ubuntu.com/security/CVE-2020-36773
+CVE_CHECK_IGNORE += "CVE-2020-36773"
+
 def gs_verdir(v):
     return "".join(v.split("."))