ghostscript-9.27-16.el8_10

エラータID: AXSA:2025-9898:01

Release date: 
Wednesday, May 7, 2025 - 15:52
Subject: 
ghostscript-9.27-16.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.

Security Fix(es):

* ghostscript: heap buffer over write vulnerability in GhostScript's lp8000_print_page() in gdevlp8k.c (CVE-2020-27792)
* ghostscript: dangling pointer in gdev_prn_open_printer_seekable() (CVE-2023-46751)
* ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling (CVE-2024-46952)
* ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space (CVE-2024-46951)
* ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding (CVE-2024-46954)
* ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript (CVE-2024-46953)
* ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution (CVE-2024-46956)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2020-27792
A heap-based buffer overwrite vulnerability was found in GhostScript's lp8000_print_page() function in the gdevlp8k.c file. This flaw allows an attacker to trick a user into opening a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service.
CVE-2023-46751
An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.
CVE-2024-46951
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution.
CVE-2024-46952
An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values).
CVE-2024-46953
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.
CVE-2024-46954
An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal.
CVE-2024-46956
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. ghostscript-9.27-16.el8_10.src.rpm
    MD5: 7d51d37fe94e193bd7e46aac7097396f
    SHA-256: e20418d91efba2e2362264b2c9dde8084e4bf65c2b985c4d94a5ddbffc82f93d
    Size: 31.76 MB

Asianux Server 8 for x86_64
  1. ghostscript-9.27-16.el8_10.x86_64.rpm
    MD5: 817d08ccb75c43a8f7755097723ddcd8
    SHA-256: f9ee0c35ba659b66aebde29c16566542c116629f49b7a4463ed935a7a8f36042
    Size: 83.69 kB
  2. ghostscript-doc-9.27-16.el8_10.noarch.rpm
    MD5: 3e1e14b40114c2fb538e62a54c504e9e
    SHA-256: 5957f99bfb2efb93fea68a8ce8d5bb8bc747c14564c8f4a9c36ea639f18b4967
    Size: 3.60 MB
  3. ghostscript-tools-dvipdf-9.27-16.el8_10.x86_64.rpm
    MD5: eb018f7a9ce6283941b370ec30ef8ce9
    SHA-256: fac293a146cb57961c9ad4148e908b4dbf22190031dd17362f8839e314d57bdb
    Size: 56.96 kB
  4. ghostscript-tools-fonts-9.27-16.el8_10.x86_64.rpm
    MD5: 504412a3b8a38cc7ecd0ac3b9b29a422
    SHA-256: a240f757972f53b05e5058bf22160681b0ccf2779e1b3b75e64905405fa966d4
    Size: 57.94 kB
  5. ghostscript-tools-printing-9.27-16.el8_10.x86_64.rpm
    MD5: 989b5a6e61f916ac062ab25dc36840a4
    SHA-256: 1f0eacbabd89d56acd64a1e139a80100ac16ba2351e7a110707818e6b16f213a
    Size: 57.94 kB
  6. ghostscript-x11-9.27-16.el8_10.x86_64.rpm
    MD5: 1271d1f1e1a8082d39897cd7c7476c9a
    SHA-256: bd500f78faa799dd6a7809ee357baf15d4b82b95cc4726e0532103e8cc724c6a
    Size: 83.23 kB
  7. libgs-9.27-16.el8_10.i686.rpm
    MD5: d5c44b8e1d77ca2dd447166c02440175
    SHA-256: 4a099273d78f5dcfe799eaf7e61cd9a05fcb2c5083ae05e890ac3d36e3160f3b
    Size: 3.22 MB
  8. libgs-9.27-16.el8_10.x86_64.rpm
    MD5: 7a9119d698a1158fd9434834f7c53069
    SHA-256: f98d3a3f6d1d5775892ef6f8508d4d999dac81d22be0956a06b28e3fe359e551
    Size: 3.06 MB
  9. libgs-devel-9.27-16.el8_10.i686.rpm
    MD5: 63227e5f4d7c47cb9f2a4d80177cf0df
    SHA-256: 9f38255fc98cf927c1c16c5536f22b24dc53b08fdc466269953ae4e68df6d425
    Size: 64.03 kB
  10. libgs-devel-9.27-16.el8_10.x86_64.rpm
    MD5: 3038bfac194dc21528d24eb439bbd19c
    SHA-256: 42f85476d2929773608087d8d4464f1ae0604dcd908932d4afa3f9327e95a17f
    Size: 64.00 kB