DSA-5578-1 ghostscript -- security update

Related Vulnerabilities: CVE-2023-46751  

It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, does not properly handle errors in the gdev_prn_open_printer_seekable() function, which could result in the execution of arbitrary commands if malformed document files are processed. For the stable distribution (bookworm), this problem has been fixed in version 10.0.0~dfsg-11+deb12u3. We recommend that you upgrade your ghostscript packages. For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript

Debian Security Advisory

DSA-5578-1 ghostscript -- security update

Date Reported:
15 Dec 2023
Affected Packages:
ghostscript
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2023-46751.
More information:

It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, does not properly handle errors in the gdev_prn_open_printer_seekable() function, which could result in the execution of arbitrary commands if malformed document files are processed.

For the stable distribution (bookworm), this problem has been fixed in version 10.0.0~dfsg-11+deb12u3.

We recommend that you upgrade your ghostscript packages.

For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript