vulnerability
Ubuntu: USN-7782-1 (CVE-2025-7462): Ghostscript vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jul 12, 2025 | Sep 30, 2025 | Oct 1, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 12, 2025
Added
Sep 30, 2025
Modified
Oct 1, 2025
Description
A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.
Solutions
ubuntu-upgrade-ghostscriptubuntu-upgrade-libgs10ubuntu-upgrade-libgs9
References
- CVE-2025-7462
- https://attackerkb.com/topics/CVE-2025-7462
- CWE-404
- CWE-476
- UBUNTU-USN-7782-1
- URL-https://artifex.com/
- URL-https://ubuntu.com/security/notices/USN-7782-1
- URL-https://vuldb.com/?ctiid.316113
- URL-https://vuldb.com/?id.316113
- URL-https://vuldb.com/?submit.610173
- URL-https://www.cve.org/CVERecord?id=CVE-2025-7462
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.