Arch Linux Security Advisory ASA-202005-4 ========================================= Severity: High Date : 2020-05-06 CVE-ID : CVE-2014-0466 CVE-2015-8107 Package : a2ps Type : multiple issues Remote : No Link : https://security.archlinux.org/AVG-1150 Summary ======= The package a2ps before version 4.14-9 is vulnerable to multiple issues including arbitrary command execution and arbitrary code execution. Resolution ========== Upgrade to 4.14-9. # pacman -Syu "a2ps>=4.14-9" The problems have been fixed upstream but no release is available yet. Workaround ========== None. Description =========== - CVE-2014-0466 (arbitrary command execution) The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file. - CVE-2015-8107 (arbitrary code execution) A format string vulnerability in GNU a2ps 4.14 allows remote attackers to execute arbitrary code. Impact ====== A remote attacker can send crafted Postscript files which can execute arbitrary commands or delete files from the system. References ========== https://github.com/akimd/a2ps/commit/5ea5ff8bc0094ca1eda0dd0e011d860e994c0a88 https://github.com/akimd/a2ps/commit/90b876cb480ca9e092490c825663f23909c6173c https://security.archlinux.org/CVE-2014-0466 https://security.archlinux.org/CVE-2015-8107