Unrated severityNVD Advisory· Published Aug 1, 2023· Updated Nov 20, 2025
Ghostscript: out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in dos
CVE-2023-38559
Description
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
Affected products
31cpe:/a:redhat:enterprise_linux:8::crb+ 4 more
- cpe:/a:redhat:enterprise_linux:8::crbrange: 0:9.27-11.el8
- cpe:/a:redhat:enterprise_linux:9::crbrange: 0:9.54.0-13.el9
- cpe:/o:redhat:enterprise_linux:6
- cpe:/o:redhat:enterprise_linux:7
- cpe:/o:redhat:enterprise_linux:8
- osv-coords26 versionspkg:apk/chainguard/ghostscriptpkg:apk/chainguard/ghostscript-dbgpkg:apk/chainguard/ghostscript-devpkg:apk/chainguard/ghostscript-docpkg:apk/wolfi/ghostscriptpkg:apk/wolfi/ghostscript-dbgpkg:apk/wolfi/ghostscript-devpkg:apk/wolfi/ghostscript-docpkg:rpm/almalinux/ghostscriptpkg:rpm/almalinux/ghostscript-docpkg:rpm/almalinux/ghostscript-tools-dvipdfpkg:rpm/almalinux/ghostscript-tools-fontspkg:rpm/almalinux/ghostscript-tools-printingpkg:rpm/almalinux/ghostscript-x11pkg:rpm/almalinux/libgspkg:rpm/almalinux/libgs-develpkg:rpm/opensuse/ghostscript&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/ghostscript&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/ghostscript&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/ghostscript&distro=SUSE%20Manager%20Server%204.2
< 10.03.0-r0+ 25 more
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 10.03.0-r0
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.54.0-13.el9
- (no CPE)range: < 9.52-150000.170.1
- (no CPE)range: < 9.52-150000.170.1
- (no CPE)range: < 9.56.1-5.1
- (no CPE)range: < 9.52-150000.170.1
- (no CPE)range: < 9.52-150000.170.1
- (no CPE)range: < 9.52-23.57.1
- (no CPE)range: < 9.52-23.57.1
- (no CPE)range: < 9.52-23.57.1
- (no CPE)range: < 9.52-150000.170.1
- (no CPE)range: < 9.52-150000.170.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- access.redhat.com/errata/RHSA-2023:6544mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2023:7053mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/security/cve/CVE-2023-38559mitrevdb-entryx_refsource_REDHAT
- bugzilla.redhat.com/show_bug.cgimitreissue-trackingx_refsource_REDHAT
- bugs.ghostscript.com/show_bug.cgimitre
- git.ghostscript.commitre
News mentions
0No linked articles in our index yet.