Summary: | Created PDF embeds the entire command-line invocation, including the plaintext password. | ||
---|---|---|---|
Product: | Ghostscript | Reporter: | Vasileios Flengas <v.flengas> |
Component: | Security (public) | Assignee: | Chris Liddell (chrisl) <chris.liddell> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | carnil, dr, jsmeix, ken.sharp, marc.deslauriers, robin.watts, sam, till.kamppeter, zdohnal |
Priority: | P2 | ||
Version: | 10.05.0 | ||
Hardware: | PC | ||
OS: | All | ||
Customer: | Word Size: | --- | |
Attachments: | The archive includes both the images described and the pdf generated. |
Description
Vasileios Flengas
2025-04-11 17:47:24 UTC
<sigh> It's caused by using '#' instead of '=', which is defeating the parameter scanning. I'll look at it on Monday. I've fixed this, but the commit isn't public. These days we keep security commits in a private repository until they are released because, being open source, as soon as we push them to our regular repository they are, in effect, public. Hence the 'in progress' status, it'll remain there until we do a release with the code included. I've chatted with my colleague who normally raises CVEs and, given that MITRE have announced funding for the next year, we're going to go ahead and request a CVE. Our most recent request keeps being rebuffed so we'll just have to see what happens with another new one. CVE-2025-48708 |