CVE-2017-8291

Priority
High
Description
Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote
command execution via .rsdparams type confusion with a "/OutputFile
(%pipe%" substring in a crafted .eps document that is an input to the gs
program, as exploited in the wild in April 2017.
References
Bugs
Notes
 sbeattie> introduced regression (LP: #1687614); needs upstream commits
  57f20719e1cfaea77b67cb26e26de7fe4d7f9b2e and
  ccfd2c75ac9be4cbd369e4cbdd40ba11a0c7bdad
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):released (9.19~dfsg+1-0ubuntu8)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [9.05~dfsg-0ubuntu4.5])
Ubuntu 14.04 LTS (Trusty Tahr):released (9.10~dfsg-0ubuntu10.7)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (9.18~dfsg~0-0ubuntu2.4)
Ubuntu 17.04 (Zesty Zapus):released (9.19~dfsg+1-0ubuntu7.2)
Patches:
Upstream:https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=4f83478c88
Upstream:https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=04b37bbce1
More Information

Updated: 2017-08-11 23:55:59 UTC (commit 13081)