ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2decodegrayscaleimage function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.11+20120125-1ubuntu1.1", "binary_name": "jbig2dec" }, { "binary_version": "0.11+20120125-1ubuntu1.1", "binary_name": "jbig2dec-dbgsym" }, { "binary_version": "0.11+20120125-1ubuntu1.1", "binary_name": "libjbig2dec0" }, { "binary_version": "0.11+20120125-1ubuntu1.1", "binary_name": "libjbig2dec0-dbgsym" }, { "binary_version": "0.11+20120125-1ubuntu1.1", "binary_name": "libjbig2dec0-dev" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.12+20150918-1ubuntu0.1", "binary_name": "jbig2dec" }, { "binary_version": "0.12+20150918-1ubuntu0.1", "binary_name": "jbig2dec-dbgsym" }, { "binary_version": "0.12+20150918-1ubuntu0.1", "binary_name": "libjbig2dec0" }, { "binary_version": "0.12+20150918-1ubuntu0.1", "binary_name": "libjbig2dec0-dbgsym" }, { "binary_version": "0.12+20150918-1ubuntu0.1", "binary_name": "libjbig2dec0-dev" } ] }