DEBIAN-CVE-2025-7462

Source
https://security-tracker.debian.org/tracker/CVE-2025-7462
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7462.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-7462
Upstream
Downstream
Published
2025-07-12T06:15:21.200Z
Modified
2025-11-19T02:02:49.088819Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.

References

Affected packages

Debian:11 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.53.3~dfsg-7+deb11u11

Affected versions

9.*
9.53.3~dfsg-7
9.53.3~dfsg-7+deb11u1
9.53.3~dfsg-7+deb11u2
9.53.3~dfsg-7+deb11u3
9.53.3~dfsg-7+deb11u4
9.53.3~dfsg-7+deb11u5
9.53.3~dfsg-7+deb11u6
9.53.3~dfsg-7+deb11u7
9.53.3~dfsg-7+deb11u8
9.53.3~dfsg-7+deb11u9
9.53.3~dfsg-7+deb11u10

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7462.json"

Debian:12 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.0.0~dfsg-11+deb12u8

Affected versions

10.*
10.0.0~dfsg-11
10.0.0~dfsg-11+deb12u1
10.0.0~dfsg-11+deb12u2
10.0.0~dfsg-11+deb12u3
10.0.0~dfsg-11+deb12u4
10.0.0~dfsg-11+deb12u5
10.0.0~dfsg-11+deb12u6
10.0.0~dfsg-11+deb12u7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7462.json"

Debian:13 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.05.1~dfsg-1+deb13u1

Affected versions

10.*
10.05.1~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7462.json"

Debian:14 / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/debian/ghostscript?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.05.1~dfsg-2

Affected versions

10.*
10.05.1~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7462.json"