It was discovered that Ghostscript incorrectly handled pipe devices. If a user or automated system were tricked into opening a specially crafted PDF file, a remote attacker could use this issue to execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "ghostscript", "binary_version": "9.50~dfsg-5ubuntu4.8" }, { "binary_name": "ghostscript-dbg", "binary_version": "9.50~dfsg-5ubuntu4.8" }, { "binary_name": "ghostscript-doc", "binary_version": "9.50~dfsg-5ubuntu4.8" }, { "binary_name": "ghostscript-x", "binary_version": "9.50~dfsg-5ubuntu4.8" }, { "binary_name": "libgs-dev", "binary_version": "9.50~dfsg-5ubuntu4.8" }, { "binary_name": "libgs9", "binary_version": "9.50~dfsg-5ubuntu4.8" }, { "binary_name": "libgs9-common", "binary_version": "9.50~dfsg-5ubuntu4.8" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "ghostscript", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "ghostscript-dbgsym", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "ghostscript-doc", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "ghostscript-x", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "ghostscript-x-dbgsym", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "libgs-dev", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "libgs9", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "libgs9-common", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" }, { "binary_name": "libgs9-dbgsym", "binary_version": "9.55.0~dfsg1-0ubuntu5.3" } ] }