Debian Security Advisory
DSA-5383-1 ghostscript -- security update
- Date Reported:
- 05 Apr 2023
- Affected Packages:
- ghostscript
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 1033757.
In Mitre's CVE dictionary: CVE-2023-28879. - More information:
-
It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, is prone to a buffer overflow vulnerability in the (T)BCP encoding filters, which could result in the execution of arbitrary code if malformed document files are processed (despite the -dSAFER sandbox being enabled).
For the stable distribution (bullseye), this problem has been fixed in version 9.53.3~dfsg-7+deb11u4.
We recommend that you upgrade your ghostscript packages.
For the detailed security status of ghostscript please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ghostscript