Arch Linux alert ASA-202505-15 (ghostscript)
From: | Andrea Denisse <denisse@archlinux.org> | |
To: | arch-security <arch-security@lists.archlinux.org> | |
Subject: | [ASA-202505-15] ghostscript: information disclosure | |
Date: | Fri, 13 Jun 2025 14:28:51 -0600 | |
Message-ID: | <bcd226d70f881dbe82e72cfe1ff86331b4355995.camel@archlinux.org> | |
Archive-link: | Article |
Arch Linux Security Advisory ASA-202505-15 ========================================== Severity: Low Date : 2025-05-24 CVE-ID : CVE-2025-48708 Package : ghostscript Type : information disclosure Remote : No Link : https://security.archlinux.org/AVG-2883 Summary ======= The package ghostscript before version 10.05.1-2 is vulnerable to information disclosure. Resolution ========== Upgrade to 10.05.1-2. # pacman -Syu "ghostscript>=10.05.1-2" The problem has been fixed upstream in version 10.05.1. Workaround ========== None. Description =========== gs_lib_ctx_stash_sanitized_arg in base/gslibctx.c in Artifex Ghostscript before 10.05.1 lacks argument sanitization for the # case. A created PDF document includes its password in cleartext. Impact ====== A local attacker can access the password used to protect a PDF in cleartext. References ========== https://bugs.ghostscript.com/show_bug.cgi?id=708446 https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.gi... https://security.archlinux.org/CVE-2025-48708