CVE-2025-7462

NameCVE-2025-7462
DescriptionA vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1109270

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ghostscript (PTS)bullseye9.53.3~dfsg-7+deb11u7vulnerable
bullseye (security)9.53.3~dfsg-7+deb11u10vulnerable
bookworm, bookworm (security)10.0.0~dfsg-11+deb12u7vulnerable
trixie10.05.1~dfsg-1vulnerable
forky, sid10.05.1~dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ghostscriptsource(unstable)10.05.1~dfsg-21109270

Notes

[trixie] - ghostscript <no-dsa> (Minor issue; crash, can be piggy-backed in future update)
[bookworm] - ghostscript <no-dsa> (Minor issue; crash, can be piggy-backed in future update)
[bullseye] - ghostscript <postponed> (Minor issue; crash)
https://bugs.ghostscript.com/show_bug.cgi?id=708606
https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4abed95110f84d5efcd7aee38c7cb

Search for package or bug name: Reporting problems