Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initializedscparser.
{
"binaries": [
{
"binary_version": "9.10~dfsg-0ubuntu10.5",
"binary_name": "ghostscript"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.5",
"binary_name": "ghostscript-x"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.5",
"binary_name": "libgs-dev"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.5",
"binary_name": "libgs9"
},
{
"binary_version": "9.10~dfsg-0ubuntu10.5",
"binary_name": "libgs9-common"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "9.18~dfsg~0-0ubuntu2.2",
"binary_name": "ghostscript"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.2",
"binary_name": "ghostscript-x"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.2",
"binary_name": "libgs-dev"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.2",
"binary_name": "libgs9"
},
{
"binary_version": "9.18~dfsg~0-0ubuntu2.2",
"binary_name": "libgs9-common"
}
],
"availability": "No subscription required"
}