Bug 1213634 (CVE-2023-38560)

Summary: VUL-0: CVE-2023-38560: ghostscript,ghostscript-library: integer overflow during parsing of a corrupt TrueType font
Product: [Novell Products] SUSE Security Incidents Reporter: Carlos López <carlos.lopez>
Component: IncidentsAssignee: Johannes Meixner <jsmeix>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P5 - None CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/373358/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-38560:7.8:(AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Carlos López 2023-07-25 10:17:42 UTC
CVE-2023-38560

An Integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name allows a local attacker to cause a denial of service via a rafted PCL file and tranforming it to PDF format

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38560
https://bugzilla.redhat.com/show_bug.cgi?id=2224368
Comment 1 Carlos López 2023-07-25 10:19:24 UTC
We do not ship the affected code, closing.