CVE-2025-27835 ghostscript: Buffer overflow when converting glyphs to unicode (#2355025)
CVE-2025-27834 ghostscript: Buffer overflow caused by an oversized Type 4 function in a PDF (#2355023)
CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow (#2355021)
CVE-2025-27836 ghostscript: device: Print buffer overflow (#2355019)
CVE-2025-27830 ghostscript: Buffer overflow during serialization of DollarBlend in font (#2355015)
CVE-2025-27833 ghostscript: Buffer overflow with long TTF font name (#2355011)
CVE-2025-27837 ghostscript: Access to arbitrary files through truncated path with invalid UTF-8 (#2355009)
CVE-2025-27831 ghostscript: Text buffer overflow with long characters (#2355007)
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2025-3a7a29de24
Please log in to add feedback.
This update has been submitted for testing by zdohnal.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'passed'.
This update has been pushed to testing.
zdohnal edited this update.
Works
This update can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by zdohnal.
This update has been pushed to stable.