VYPR

apk package

chainguard/ghostscript-dev

pkg:apk/chainguard/ghostscript-dev

Vulnerabilities (13)

  • CVE-2025-59800Sep 22, 2025
    affected < 10.07.0-r0fixed 10.07.0-r0

    In Artifex Ghostscript through 10.05.1, ocr_begin_page in devices/gdevpdfocr.c has an integer overflow that leads to a heap-based buffer overflow in ocr_line8.

  • CVE-2025-59798Sep 22, 2025
    affected < 10.07.0-r0fixed 10.07.0-r0

    Artifex Ghostscript through 10.05.1 has a stack-based buffer overflow in pdf_write_cmap in devices/vector/gdevpdtw.c.

  • CVE-2024-33871Jul 3, 2024
    affected < 10.03.1-r0fixed 10.03.1-r0

    An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbi

  • CVE-2024-33870Jul 3, 2024
    affected < 10.03.1-r0fixed 10.03.1-r0

    An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will g

  • CVE-2024-33869Jul 3, 2024
    affected < 10.03.1-r0fixed 10.03.1-r0

    An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# ou

  • CVE-2024-29511Jul 3, 2024
    affected < 10.03.1-r0fixed 10.03.1-r0

    Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file

  • CVE-2024-29510Jul 3, 2024
    affected < 10.03.1-r0fixed 10.03.1-r0

    Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.

  • CVE-2023-52722Apr 27, 2024
    affected < 10.03.1-r0fixed 10.03.1-r0

    An issue was discovered in Artifex Ghostscript before 10.03.1. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.

  • CVE-2023-46751Dec 6, 2023
    affected < 10.02.1-r0fixed 10.02.1-r0

    An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.

  • CVE-2023-43115Sep 18, 2023
    affected < 10.02.0-r0fixed 10.02.0-r0

    In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJ

  • CVE-2023-38560Aug 1, 2023
    affected < 10.02.0-r0fixed 10.02.0-r0

    An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.

  • CVE-2023-38559Aug 1, 2023
    affected < 10.03.0-r0fixed 10.03.0-r0

    A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.

  • CVE-2023-36664Jun 25, 2023
    affected < 0fixed 0

    Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).