a2ps: Arbitrary code execution — GLSA 201701-67

A vulnerability in a2ps' fixps script might allow remote attackers to execute arbitrary code.

Affected packages

app-text/a2ps on all architectures
Affected versions < 4.14-r5
Unaffected versions >= 4.14-r5

Background

a2ps is an Any to PostScript filter.

Description

a2ps’ fixps script does not invoke gs with the -dSAFER option.

Impact

Remote attackers, by enticing a user to process a specially crafted PostScript file, could delete arbitrary files or execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All a2ps users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/a2ps-4.14-r5"
 

References

Release date
January 29, 2017

Latest revision
January 29, 2017: 1

Severity
normal

Exploitable
remote

Bugzilla entries