A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
The product reads data past the end, or before the beginning, of the intended buffer.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6544 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7053 | third party advisory vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-38559 | third party advisory vdb entry |
https://bugs.ghostscript.com/show_bug.cgi?id=706897 | permissions required |
https://bugzilla.redhat.com/show_bug.cgi?id=2224367 | third party advisory issue tracking |
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1 | patch mailing list |
https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/ |