ghostscript is vulnerable to Out-of-bounds Write. The vulnerability exists in base/sbcp.c
because the buffer size is not checked which allows an attacker to cause buffer overflows.
www.openwall.com/lists/oss-security/2023/04/12/4
bugs.ghostscript.com/show_bug.cgi?id=706494
ghostscript.readthedocs.io/en/latest/News.html
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=37ed5022cecd584de868933b5b60da2e995b3179
git.ghostscript.com/?p=ghostpdl.git;h=37ed5022cecd584de868933b5b60da2e995b3179
lists.debian.org/debian-lts-announce/2023/04/msg00003.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/
lists.fedoraproject.org/archives/list/[email protected]/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/
lists.fedoraproject.org/archives/list/[email protected]/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/
lists.fedoraproject.org/archives/list/[email protected]/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
secdb.alpinelinux.org/v3.16/main.yaml
secdb.alpinelinux.org/v3.17/main.yaml
security.gentoo.org/glsa/202309-03
www.debian.org/security/2023/dsa-5383