Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-7462

Опубликовано: 12 июл. 2025
Источник: ubuntu
Приоритет: low
CVSS2: 5
CVSS3: 4.3

Описание

A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.

РелизСтатусПримечание
devel

released

10.05.0dfsg1-0ubuntu4
esm-infra/bionic

needs-triage

esm-infra/focal

needs-triage

esm-infra/xenial

needs-triage

jammy

released

9.55.0~dfsg1-0ubuntu5.13
noble

released

10.02.1~dfsg1-0ubuntu7.8
plucky

released

10.05.0dfsg1-0ubuntu1.2
questing

released

10.05.0dfsg1-0ubuntu4
upstream

released

10.05.1~dfsg-2

Показывать по

5 Medium

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
5 месяцев назад

A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
debian
5 месяцев назад

A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1 ...

CVSS3: 4.3
github
5 месяцев назад

A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.

CVSS3: 4.3
fstec
5 месяцев назад

Уязвимость функции pdf_ferror() (devices/vector/gdevpdf.c) фреймворка GhostPDL, позволяющая нарушителю вызвать отказ в обслуживании

5 Medium

CVSS2

4.3 Medium

CVSS3