Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1382300 - (CVE-2016-7978) CVE-2016-7978 ghostscript: reference leak in .setdevice allows use-after-free and remote code execution
CVE-2016-7978 ghostscript: reference leak in .setdevice allows use-after-free...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160930,repor...
: Security
Depends On: 1390299 1390300 1390488
Blocks: 1380329
  Show dependency treegraph
 
Reported: 2016-10-06 05:44 EDT by Cedric Buissart
Modified: 2017-01-04 06:10 EST (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that the ghostscript function .setdevice suffered a use-after-free vulnerability due to an incorrect reference count. A specially crafted postscript document could trigger code execution in the context of the gs process.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-01-04 06:10:39 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0013 normal SHIPPED_LIVE Moderate: ghostscript security update 2017-01-04 10:09:56 EST

  None (edit)
Description Cedric Buissart 2016-10-06 05:44:43 EDT
An incorrect reference count was found in .setdevice. This leads to a use-after-free, triggering a Denial of Service, or possibly, arbitrary code execution.

Upstream bug :
 - Bug 697179 - double free with .setdevice
http://bugs.ghostscript.com/show_bug.cgi?id=697179

upstream fix :
 - Bug 697179: Reference count device icc profile when copying a device
http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commitdiff;h=d5ad1e02

Reference :
http://seclists.org/oss-sec/2016/q4/37
Comment 4 Cedric Buissart 2016-10-31 12:00:45 EDT
Ghostscript's ICC profile management is a feature that started with version 9.
Thus previous versions, in particular ghostscript 8.70, do not have capability to open ICC profile files for color management, and thus are not affected by this CVE.
RHEL5 and 6 are not affected by this issue.
Comment 6 Cedric Buissart 2016-11-01 04:42:38 EDT
Created ghostscript tracking bugs for this issue:

Affects: fedora-all [bug 1390488]
Comment 7 errata-xmlrpc 2017-01-04 05:11:38 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0013 https://rhn.redhat.com/errata/RHSA-2017-0013.html

Note You need to log in before you can comment on or make changes to this bug.