Unrated severityNVD Advisory· Published Dec 6, 2023· Updated Aug 2, 2024
CVE-2023-46751
CVE-2023-46751
Description
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.
Affected products
36- osv-coords35 versionspkg:apk/chainguard/ghostscriptpkg:apk/chainguard/ghostscript-dbgpkg:apk/chainguard/ghostscript-devpkg:apk/chainguard/ghostscript-docpkg:apk/wolfi/ghostscriptpkg:apk/wolfi/ghostscript-dbgpkg:apk/wolfi/ghostscript-devpkg:apk/wolfi/ghostscript-docpkg:rpm/almalinux/ghostscriptpkg:rpm/almalinux/ghostscript-docpkg:rpm/almalinux/ghostscript-tools-dvipdfpkg:rpm/almalinux/ghostscript-tools-fontspkg:rpm/almalinux/ghostscript-tools-printingpkg:rpm/almalinux/ghostscript-x11pkg:rpm/almalinux/libgspkg:rpm/almalinux/libgs-develpkg:rpm/opensuse/ghostscript&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/ghostscript&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/ghostscript&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ghostscript&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5
< 10.02.1-r0+ 34 more
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 10.02.1-r0
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.27-16.el8_10
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.56.1-8.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-23.63.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-23.63.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-150000.177.1
- (no CPE)range: < 9.52-23.63.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.debian.org/security/2023/dsa-5578mitrevendor-advisory
- bugs.ghostscript.com/show_bug.cgimitre
- ghostscript.commitre
- git.ghostscript.commitre
News mentions
0No linked articles in our index yet.