Security update for ghostscript
| Announcement ID: | SUSE-SU-2026:21363-1 |
|---|---|
| Release Date: | 2026-04-21T09:49:39Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves six vulnerabilities can now be installed.
Description:
This update for ghostscript fixes the following issues:
Update to version 10.06.0.
Security issues fixed:
- CVE-2025-59800: an integer overflow can lead to a heap-based buffer overflow in ocr_line8 (bsc#1250355).
- CVE-2025-59799: a large size value can cause a stack-based buffer overflow in pdfmark_coerce_dest (bsc#1250354).
- CVE-2025-59798: stack-based buffer overflow in pdf_write_cmap can lead to a denial-of-service (bsc#1250353).
- CVE-2025-48708: lacks of argument sanitization may lead to password disclosure (bsc#1243701).
- CVE-2025-46646: mishandling of overlong utf-8 encoding in artifex ghostscript's decode_utf8 function (bsc#1257699).
Other updates and bugfixes:
-
switch over to libalternatives for ghostscript to provide a gs variant (bsc#1245896)
-
Version upgrade to 10.06.0:
-
removes the non-standard operator "selectdevice" (cf. the entry below dated Tue Apr 1 09:56:06 UTC 2025)
-
Version upgrade to 10.05.1:
-
an overflow issue in Freetype on platforms where long is a 4 byte (rather than 8 byte) type (Microsoft Windows, for example) causing corrupted glyph rendering at higher resolutions
- an issue with embedded files, affecting Zugferd format PDF creation.
- broken logic in PDF Optional Content processing
- potential slow down due to searching for identifiable font files
- a small number of extreme edge case segmentation faults.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP applications 16.0
zypper in -t patch SUSE-SLES-16.0-602=1 -
SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-602=1
Package List:
-
SUSE Linux Enterprise Server for SAP applications 16.0 (ppc64le x86_64)
- ghostscript-x11-debuginfo-10.06.0-160000.1.1
- ghostscript-devel-10.06.0-160000.1.1
- ghostscript-debugsource-10.06.0-160000.1.1
- ghostscript-10.06.0-160000.1.1
- ghostscript-x11-10.06.0-160000.1.1
- ghostscript-debuginfo-10.06.0-160000.1.1
-
SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
- ghostscript-x11-debuginfo-10.06.0-160000.1.1
- ghostscript-devel-10.06.0-160000.1.1
- ghostscript-debugsource-10.06.0-160000.1.1
- ghostscript-10.06.0-160000.1.1
- ghostscript-x11-10.06.0-160000.1.1
- ghostscript-debuginfo-10.06.0-160000.1.1
References:
- https://www.suse.com/security/cve/CVE-2025-46646.html
- https://www.suse.com/security/cve/CVE-2025-48708.html
- https://www.suse.com/security/cve/CVE-2025-59798.html
- https://www.suse.com/security/cve/CVE-2025-59799.html
- https://www.suse.com/security/cve/CVE-2025-59800.html
- https://www.suse.com/security/cve/CVE-2025-59801.html
- https://bugzilla.suse.com/show_bug.cgi?id=1243701
- https://bugzilla.suse.com/show_bug.cgi?id=1245896
- https://bugzilla.suse.com/show_bug.cgi?id=1250353
- https://bugzilla.suse.com/show_bug.cgi?id=1250354
- https://bugzilla.suse.com/show_bug.cgi?id=1250355
- https://bugzilla.suse.com/show_bug.cgi?id=1257699