DescriptionStack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1214, DSA-1243-1
NVD severitymedium
Debian Bugs398292, 400904, 400906, 402063

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
evince (PTS)stretch (security), stretch3.22.1-3+deb9u2fixed
buster, buster (security)3.30.2-3+deb10u1fixed
bookworm, sid42.2-1fixed
gv (PTS)stretch1:3.7.4-1fixed
bookworm, sid, buster, bullseye1:3.7.4-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
evincesource(unstable)0.4.0-3medium400904, 400906, 402063

Search for package or bug name: Reporting problems