An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c.
This and many more CVEs published in the same batch ( CVE-2025-27837,CVE-2025-27836,CVE-2025-27835,CVE-2025-27834,CVE-2025-27833,CVE-2025-27832,CVE-2025-27831,CVE-2025-27830 ) and some newer ones are still not fixed in RedHat Stream 8/9 and similar distributions such as Alma or Rocky. For this CVE and some of the others in the batch there are public RCE exploits, see for example https://bugs.ghostscript.com/show_bug.cgi?id=708131 Many products use Ghostscript in their pipelines, such as ImageMagick and LibreOffice, and are exposed to the internet which makes this a remotely exploitable RCE vulnerability in many cases. Why are all of these vulnerabilities not fixed, even though patches are available?
Small correction, CVE-2025-27832 seems to be the only one fixed from the batch https://gitlab.com/redhat/centos-stream/rpms/ghostscript/-/commit/97942d253f6a69621ed610d37ef026af81963da0