First published: Thu Mar 27 2025(Updated: )
It was discovered that Ghostscript incorrectly serialized DollarBlend in certain fonts. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27830) It was discovered that Ghostscript incorrectly handled the DOCXWRITE TXTWRITE device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-27831) It was discovered that Ghostscript incorrectly handled the NPDL device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27832) It was discovered that Ghostscript incorrectly handled certain long TTF file names. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-27833) It was discovered that Ghostscript incorrectly handled oversized Type 4 functions in certain PDF documents. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-27834) It was discovered that Ghostscript incorrectly handled converting certain glyphs to Unicode. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27835) It was discovered that Ghostscript incorrectly handled the BJ10V device. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-27836)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ghostscript | <10.03.1~dfsg1-0ubuntu2.2 | 10.03.1~dfsg1-0ubuntu2.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libgs10 | <10.03.1~dfsg1-0ubuntu2.2 | 10.03.1~dfsg1-0ubuntu2.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/ghostscript | <10.02.1~dfsg1-0ubuntu7.5 | 10.02.1~dfsg1-0ubuntu7.5 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libgs10 | <10.02.1~dfsg1-0ubuntu7.5 | 10.02.1~dfsg1-0ubuntu7.5 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/ghostscript | <9.55.0~dfsg1-0ubuntu5.11 | 9.55.0~dfsg1-0ubuntu5.11 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libgs9 | <9.55.0~dfsg1-0ubuntu5.11 | 9.55.0~dfsg1-0ubuntu5.11 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/ghostscript | <9.50~dfsg-5ubuntu4.15 | 9.50~dfsg-5ubuntu4.15 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libgs9 | <9.50~dfsg-5ubuntu4.15 | 9.50~dfsg-5ubuntu4.15 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability USN-7378-1 is considered to be high severity due to its potential for a denial of service and possible arbitrary code execution.
To fix USN-7378-1, update to the recommended version of Ghostscript and libgs packages as specified in the advisory.
USN-7378-1 affects users of Ubuntu with specific versions of Ghostscript and libgs packages.
An attacker can exploit the USN-7378-1 vulnerability to crash Ghostscript, leading to a denial of service, or potentially execute arbitrary code.
USN-7378-1 was published in response to vulnerabilities discovered in Ghostscript that were addressed with a security update.