Bug 2253365 (CVE-2023-46751)

Summary: CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable()
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: mjg, zdohnal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ghostscript 10.02.1 Doc Type: ---
Doc Text:
A flaw was found in Ghostscript. A remote attacker may use a specially crafted payload to trigger access to previously freed memory, which can potentially lead to remote code execution or an application crash.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2253366    
Bug Blocks: 2253353    

Description Robb Gatica 2023-12-06 22:00:15 UTC
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.

https://bugs.ghostscript.com/show_bug.cgi?id=707264
https://ghostscript.com/
https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=dcdbc595c13c9d11d235702dff46bb74c80f7698

Comment 1 Robb Gatica 2023-12-06 22:00:33 UTC
Created ghostscript tracking bugs for this issue:

Affects: fedora-all [bug 2253366]

Comment 3 Michael J Gruber 2023-12-09 16:18:44 UTC
That commit has been backported as commit 5d2da96e81c7455338302c71a291088a8396245a which is contained in gs 10.02.1.

Comment 5 errata-xmlrpc 2025-04-30 09:07:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:4362 https://access.redhat.com/errata/RHSA-2025:4362

Comment 6 errata-xmlrpc 2025-05-13 11:54:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7422 https://access.redhat.com/errata/RHSA-2025:7422