CVE-2025-27835 ghostscript: Buffer overflow when converting glyphs to unicode (#2355026)
CVE-2025-27834 ghostscript: Buffer overflow caused by an oversized Type 4 function in a PDF (#2355024)
CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow (#2355022)
CVE-2025-27836 ghostscript: device: Print buffer overflow (#2355020)
CVE-2025-27830 ghostscript: Buffer overflow during serialization of DollarBlend in font (#2355016)
CVE-2025-27833 ghostscript: Buffer overflow with long TTF font name (#2355012)
CVE-2025-27837 ghostscript: Access to arbitrary files through truncated path with invalid UTF-8 (#2355010)
CVE-2025-27831 ghostscript: Text buffer overflow with long characters (#2355008)
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2025-47818d27ba
Please log in to add feedback.
This update has been submitted for testing by zdohnal.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'passed'.
This update has been pushed to testing.
no regressions noted
zdohnal edited this update.
This update can be pushed to stable now if the maintainer wishes
Other users reported to me that it works.
This update has been submitted for stable by bodhi.
This update has been pushed to stable.