Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <03df23f7-96c4-f1d1-32ea-86b2881cabe8@oracle.com>
Date: Wed, 12 Apr 2023 09:55:44 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Ghostscript CVE-2023-28879: "Shell in the Ghost"

I haven't seen mail to the list about this yet, so FYI for those who haven't
seen it via other channels.

https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscript
says:

> Artifex is pleased to announce that our team of developers have
> successfully addressed and fixed a critical security vulnerability in
> Artifex Ghostscript, version 10.01.0. A CVE (Common Vulnerabilities
> and Exposures) identifier has been assigned to the issue,
> https://nvd.nist.gov/vuln/detail/CVE-2023-28879.
> 
> On March 23, 2023, a security researcher, Hadrien Perrineau, reported
> the buffer overflow and exploit, on March 24 Artifex fixed the overflow
> and removed other related code reducing the attack surface. Fixes were
> published here:
> 
> https://git.ghostscript.com/?p=ghostpdl.git;h=37ed5022cecd584de868933b5b60da2e995b3179
> 
> https://git.ghostscript.com/?p=ghostpdl.git;h=37ed5022cecd584de868933b5b60da2e995b3179
> 
> A release, Ghostscript and GhostPDL 10.01.1, was published on March 27.
> An email alert was sent out to all Artifex customers on March 27
> notifying them of the bug and the fix. Artifex worked with customers to
> integrate the solution into their products as quickly as possible.
> On April 7 the bug was made public.
> 
> Users of Ghostscript are urged to update their software to the latest
> version immediately. By doing so, they will be able to mitigate the risk
> associated with this vulnerability and ensure the security and integrity
> of their systems.

A report from those who found the bug, including their POC, was published
yesterday:

https://offsec.almond.consulting/ghostscript-cve-2023-28879.html

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.