Bug 2184585 (CVE-2023-28879)
Summary: | CVE-2023-28879 ghostscript: buffer overflow in base/sbcp.c leading to data corruption | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | kyoshida, mschibli, nobody |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2184586, 2188297, 2188299, 2188300 | ||
Bug Blocks: | 2183631 |
Description
TEJ RATHI
2023-04-05 06:00:25 UTC
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 2184586] https://offsec.almond.consulting/ghostscript-cve-2023-28879.html https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscript Why AV -> L ? As per documentation [1] specially the "Invoking Ghostscript" section, Ghostscript can be used as a command line client just like any other command/executable or Ghostscript can also be used as a general engine inside other applications. Considering above use cases the "Attack vector" differs between being "Local" or "Network". If a custom application happens to be using the Python pillow library which internally uses the Ghostscript command line as shown in the original writeup [3] and accepts input over the network then there is a possibility of this being exploited over the network. However if this is not the case then attack vector can be considered "Local" someone needs to manually invoke the command line client on a given machine. [1] https://ghostscript.com/docs/9.54.0/Use.htm [2] https://github.com/python-pillow/Pillow/blob/main/src/PIL/EpsImagePlugin.py [3] https://offsec.almond.consulting/ghostscript-cve-2023-28879.html This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6544 https://access.redhat.com/errata/RHSA-2023:6544 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:7053 https://access.redhat.com/errata/RHSA-2023:7053 |