DSA-5446-1 ghostscript -- security update

Related Vulnerabilities: CVE-2023-36664  

It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, does not properly handle permission validation for pipe devices, which could result in the execution of arbitrary commands if malformed document files are processed. For the oldstable distribution (bullseye), this problem has been fixed in version 9.53.3~dfsg-7+deb11u5. For the stable distribution (bookworm), this problem has been fixed in version 10.0.0~dfsg-11+deb12u1. We recommend that you upgrade your ghostscript packages. For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript

Debian Security Advisory

DSA-5446-1 ghostscript -- security update

Date Reported:
03 Jul 2023
Affected Packages:
ghostscript
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2023-36664.
More information:

It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, does not properly handle permission validation for pipe devices, which could result in the execution of arbitrary commands if malformed document files are processed.

For the oldstable distribution (bullseye), this problem has been fixed in version 9.53.3~dfsg-7+deb11u5.

For the stable distribution (bookworm), this problem has been fixed in version 10.0.0~dfsg-11+deb12u1.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript