USN-7782-1

Source
https://ubuntu.com/security/notices/USN-7782-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7782-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7782-1
Upstream
Related
Published
2025-09-29T11:39:03Z
Modified
2026-02-10T04:50:09Z
Summary
ghostscript vulnerabilities
Details

It was discovered that Ghostscript incorrectly handled opening a file to write. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service (CVE-2025-7462)

It was discovered that Ghostscript incorrectly handled writing certain files. An attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service (CVE-2025-59798, CVE-2025-59799)

It was discovered that Ghostscript incorrectly handled performing OCR on certain files. An attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-59800)

References

Affected packages

Ubuntu:22.04:LTS / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/ubuntu/ghostscript@9.55.0~dfsg1-0ubuntu5.13?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.55.0~dfsg1-0ubuntu5.13

Affected versions

9.*
9.54.0~dfsg1-0ubuntu2
9.55.0~dfsg1-0ubuntu4
9.55.0~dfsg1-0ubuntu5
9.55.0~dfsg1-0ubuntu5.1
9.55.0~dfsg1-0ubuntu5.2
9.55.0~dfsg1-0ubuntu5.3
9.55.0~dfsg1-0ubuntu5.4
9.55.0~dfsg1-0ubuntu5.5
9.55.0~dfsg1-0ubuntu5.6
9.55.0~dfsg1-0ubuntu5.7
9.55.0~dfsg1-0ubuntu5.9
9.55.0~dfsg1-0ubuntu5.10
9.55.0~dfsg1-0ubuntu5.11
9.55.0~dfsg1-0ubuntu5.12

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "9.55.0~dfsg1-0ubuntu5.13",
            "binary_name": "ghostscript"
        },
        {
            "binary_version": "9.55.0~dfsg1-0ubuntu5.13",
            "binary_name": "ghostscript-x"
        },
        {
            "binary_version": "9.55.0~dfsg1-0ubuntu5.13",
            "binary_name": "libgs-dev"
        },
        {
            "binary_version": "9.55.0~dfsg1-0ubuntu5.13",
            "binary_name": "libgs9"
        },
        {
            "binary_version": "9.55.0~dfsg1-0ubuntu5.13",
            "binary_name": "libgs9-common"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7782-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                },
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-7462"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-59798"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-59799"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-59800"
        }
    ]
}

Ubuntu:24.04:LTS / ghostscript

Package

Name
ghostscript
Purl
pkg:deb/ubuntu/ghostscript@10.02.1~dfsg1-0ubuntu7.8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.02.1~dfsg1-0ubuntu7.8

Affected versions

10.*
10.01.2~dfsg1-0ubuntu2
10.01.2~dfsg1-0ubuntu2.1
10.02.1~dfsg1-0ubuntu1
10.02.1~dfsg1-0ubuntu2
10.02.1~dfsg1-0ubuntu5
10.02.1~dfsg1-0ubuntu6
10.02.1~dfsg1-0ubuntu7
10.02.1~dfsg1-0ubuntu7.1
10.02.1~dfsg1-0ubuntu7.3
10.02.1~dfsg1-0ubuntu7.4
10.02.1~dfsg1-0ubuntu7.5
10.02.1~dfsg1-0ubuntu7.6
10.02.1~dfsg1-0ubuntu7.7

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "10.02.1~dfsg1-0ubuntu7.8",
            "binary_name": "ghostscript"
        },
        {
            "binary_version": "10.02.1~dfsg1-0ubuntu7.8",
            "binary_name": "libgs-common"
        },
        {
            "binary_version": "10.02.1~dfsg1-0ubuntu7.8",
            "binary_name": "libgs-dev"
        },
        {
            "binary_version": "10.02.1~dfsg1-0ubuntu7.8",
            "binary_name": "libgs10"
        },
        {
            "binary_version": "10.02.1~dfsg1-0ubuntu7.8",
            "binary_name": "libgs10-common"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7782-1.json"
cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                },
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-7462"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-59798"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-59799"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-59800"
        }
    ]
}