|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202505-15 (ghostscript)

From:  Andrea Denisse <denisse@archlinux.org>
To:  arch-security <arch-security@lists.archlinux.org>
Subject:  [ASA-202505-15] ghostscript: information disclosure
Date:  Fri, 13 Jun 2025 14:28:51 -0600
Message-ID:  <bcd226d70f881dbe82e72cfe1ff86331b4355995.camel@archlinux.org>
Archive-link:  Article

Arch Linux Security Advisory ASA-202505-15 ========================================== Severity: Low Date : 2025-05-24 CVE-ID : CVE-2025-48708 Package : ghostscript Type : information disclosure Remote : No Link : https://security.archlinux.org/AVG-2883 Summary ======= The package ghostscript before version 10.05.1-2 is vulnerable to information disclosure. Resolution ========== Upgrade to 10.05.1-2. # pacman -Syu "ghostscript>=10.05.1-2" The problem has been fixed upstream in version 10.05.1. Workaround ========== None. Description =========== gs_lib_ctx_stash_sanitized_arg in base/gslibctx.c in Artifex Ghostscript before 10.05.1 lacks argument sanitization for the # case. A created PDF document includes its password in cleartext. Impact ====== A local attacker can access the password used to protect a PDF in cleartext. References ========== https://bugs.ghostscript.com/show_bug.cgi?id=708446 https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.gi... https://security.archlinux.org/CVE-2025-48708


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds