Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initializedscparser.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "ghostscript", "binary_version": "9.10~dfsg-0ubuntu10.5" }, { "binary_name": "ghostscript-x", "binary_version": "9.10~dfsg-0ubuntu10.5" }, { "binary_name": "libgs-dev", "binary_version": "9.10~dfsg-0ubuntu10.5" }, { "binary_name": "libgs9", "binary_version": "9.10~dfsg-0ubuntu10.5" }, { "binary_name": "libgs9-common", "binary_version": "9.10~dfsg-0ubuntu10.5" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "ghostscript", "binary_version": "9.18~dfsg~0-0ubuntu2.2" }, { "binary_name": "ghostscript-x", "binary_version": "9.18~dfsg~0-0ubuntu2.2" }, { "binary_name": "libgs-dev", "binary_version": "9.18~dfsg~0-0ubuntu2.2" }, { "binary_name": "libgs9", "binary_version": "9.18~dfsg~0-0ubuntu2.2" }, { "binary_name": "libgs9-common", "binary_version": "9.18~dfsg~0-0ubuntu2.2" } ] }