[ALSA-2025:4362] Moderate: ghostscript security update
Type:
security
Severity:
moderate
Release date:
2025-05-05
Description:
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: heap buffer over write vulnerability in GhostScript's lp8000_print_page() in gdevlp8k.c (CVE-2020-27792) * ghostscript: dangling pointer in gdev_prn_open_printer_seekable() (CVE-2023-46751) * ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling (CVE-2024-46952) * ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space (CVE-2024-46951) * ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding (CVE-2024-46954) * ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript (CVE-2024-46953) * ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution (CVE-2024-46956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 ghostscript-tools-printing-9.27-16.el8_10.aarch64.rpm 01d8cd211ba6362979b86f507a6b9d8f8decec4d696ec8df6b7f8331b031ccc9
aarch64 ghostscript-tools-fonts-9.27-16.el8_10.aarch64.rpm 3fbdc7c18fe13d12b717f9db17371eef68a217baecfc58dc3679934401b55dcc
aarch64 ghostscript-x11-9.27-16.el8_10.aarch64.rpm 47627a3aa7a032f540937911fc500d0e9c3c14d30d75e8ebc0dcef91d0203de3
aarch64 libgs-9.27-16.el8_10.aarch64.rpm b55df5576f5ae2f2a19910d60ad7dc8578ff2f6958dc873f35b32f9190baedb0
aarch64 ghostscript-9.27-16.el8_10.aarch64.rpm b60e94fb563aea049ed2d6d091aa06de79e8ebdc4ceeee3985f664fd576a5deb
aarch64 ghostscript-tools-dvipdf-9.27-16.el8_10.aarch64.rpm be38928a3bffa0b5c079e017dafd034ef1fdad4848f4390edc445a577ada12cf
aarch64 libgs-devel-9.27-16.el8_10.aarch64.rpm db27f73036d8da9d05da94b66e809d22df7075b16664a48d66179aadb06bdd00
i686 libgs-9.27-16.el8_10.i686.rpm 1ea03b36af56de28318ba08f3e7adad36b6104298f6851b574184f88045e6629
i686 libgs-devel-9.27-16.el8_10.i686.rpm 7914aaf552e09ebf872302f5189dcad5996b5236f0575415bf92204139dcf932
noarch ghostscript-doc-9.27-16.el8_10.noarch.rpm 43d139df332c77109b35583f9703c08e52add74085247be9afb4e8288332e8c0
ppc64le ghostscript-tools-dvipdf-9.27-16.el8_10.ppc64le.rpm 3691a1cc25a57ed91a1cb63fb7ef1c527a0d04318f9d14509a37551f791416b4
ppc64le libgs-9.27-16.el8_10.ppc64le.rpm 6bd79abef0cbb87ae3c623877d38a1d6b9185b08358718d16cd2e0ed5c97e6d5
ppc64le ghostscript-tools-fonts-9.27-16.el8_10.ppc64le.rpm 71c016bc22aad6a8d0a97092e96b70dc114ec24f685b8e859d7730744b302bb8
ppc64le ghostscript-tools-printing-9.27-16.el8_10.ppc64le.rpm 80975e939529857855a0f4df3de3dc21f4191fa7c2d0f2aaa3f12889030ca4b5
ppc64le ghostscript-9.27-16.el8_10.ppc64le.rpm bddc6202818dc965f705abcaa7d1d5cf7ad5f14cfa51db95819a33ddde8df4ea
ppc64le libgs-devel-9.27-16.el8_10.ppc64le.rpm eb1c3c42e73948b5249ad9e181a7b6112903e8d7d8d5c4fafa3d0bc725d0c2bb
ppc64le ghostscript-x11-9.27-16.el8_10.ppc64le.rpm f933662ab205225769144d95bf1f4d976d265fbfa413baf73c7ca8063d4b61bf
s390x libgs-devel-9.27-16.el8_10.s390x.rpm 0ec02e4a1efe97553272a3051748b31efac4123cdad9fbcb820b8b332e5e7b31
s390x ghostscript-tools-printing-9.27-16.el8_10.s390x.rpm 799a8ab83de6243300e87d2175631878b75ce9e994d97b2d91c4da45a346959c
s390x ghostscript-tools-dvipdf-9.27-16.el8_10.s390x.rpm 8bfbf8c39a1624ffb09bc216113540a00cfd8d46ab6a540d040c5357dbec0861
s390x ghostscript-9.27-16.el8_10.s390x.rpm 9ac0a9f854edd85c2a952923f0f8e5ec183b57985efd164df091028648aca1ed
s390x ghostscript-tools-fonts-9.27-16.el8_10.s390x.rpm a1b7c128454cb2e8da8ba369e2349999b7b8f98e12b64a881ccf926073dcb95d
s390x ghostscript-x11-9.27-16.el8_10.s390x.rpm b22910d1cf111f45b005fbc554fed0e6c397add5d10d010b48906af132ad91a7
s390x libgs-9.27-16.el8_10.s390x.rpm c2baf73b94921c992390682fbea43bc6cda0c0c71c7c2784f5f4ff4f97eff02e
x86_64 libgs-devel-9.27-16.el8_10.x86_64.rpm 177762510f7fcbb2d205a697fb7dc635cae9d306b99cc05cc4cc82426cfdba46
x86_64 ghostscript-tools-printing-9.27-16.el8_10.x86_64.rpm 53e1700dbb1ae194e746e3de1d801fbec4c63468d3996852f10e241b016361bb
x86_64 ghostscript-tools-dvipdf-9.27-16.el8_10.x86_64.rpm 641b8226e67cb88450b367fe039e837b489b7a2e922bfdef63a61740c7ec53de
x86_64 ghostscript-tools-fonts-9.27-16.el8_10.x86_64.rpm c757ef0b19052e5b8aea5644ab0e85b3234b6d8f851e1c68ac768306effaa3bc
x86_64 ghostscript-x11-9.27-16.el8_10.x86_64.rpm e027def4402f2950351a839e01caf7a7a8d5f93fbb280b7202fda2a4cdfb5be4
x86_64 ghostscript-9.27-16.el8_10.x86_64.rpm f75b8f4cdb23e4f6cdc6787b0e3388b6d35934f8521238144470ba99f64ad7f6
x86_64 libgs-9.27-16.el8_10.x86_64.rpm fac7b699094669acc59faa9825ea45c75e71b62ccd3ef32df9326f8c2af154a6
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.