{"schema_version":"1.7.2","id":"OESA-2022-1487","modified":"2022-01-14T11:03:27Z","published":"2022-01-14T11:03:27Z","upstream":["CVE-2021-45949","CVE-2021-45944"],"summary":"ghostscript security update","details":"Ghostscript is an interpreter for PostScript and Portable Document Format (PDF) files. Ghostscript consists of a PostScript interpreter layer, and a graphics library.\r\n\r\nSecurity Fix(es):\r\n\r\nGhostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp).(CVE-2021-45949)\r\n\r\nGhostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).(CVE-2021-45944)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"ghostscript","purl":"pkg:rpm/openEuler/ghostscript\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.52-5.oe1"}]}],"ecosystem_specific":{"aarch64":["ghostscript-devel-9.52-5.oe1.aarch64.rpm","ghostscript-9.52-5.oe1.aarch64.rpm","ghostscript-tools-dvipdf-9.52-5.oe1.aarch64.rpm","ghostscript-debugsource-9.52-5.oe1.aarch64.rpm","ghostscript-debuginfo-9.52-5.oe1.aarch64.rpm"],"noarch":["ghostscript-help-9.52-5.oe1.noarch.rpm"],"src":["ghostscript-9.52-5.oe1.src.rpm"],"x86_64":["ghostscript-9.52-5.oe1.x86_64.rpm","ghostscript-devel-9.52-5.oe1.x86_64.rpm","ghostscript-debuginfo-9.52-5.oe1.x86_64.rpm","ghostscript-debugsource-9.52-5.oe1.x86_64.rpm","ghostscript-tools-dvipdf-9.52-5.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"ghostscript","purl":"pkg:rpm/openEuler/ghostscript\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.52-6.oe1"}]}],"ecosystem_specific":{"aarch64":["ghostscript-tools-dvipdf-9.52-6.oe1.aarch64.rpm","ghostscript-debugsource-9.52-6.oe1.aarch64.rpm","ghostscript-9.52-6.oe1.aarch64.rpm","ghostscript-debuginfo-9.52-6.oe1.aarch64.rpm","ghostscript-devel-9.52-6.oe1.aarch64.rpm"],"noarch":["ghostscript-help-9.52-6.oe1.noarch.rpm"],"src":["ghostscript-9.52-6.oe1.src.rpm"],"x86_64":["ghostscript-9.52-6.oe1.x86_64.rpm","ghostscript-devel-9.52-6.oe1.x86_64.rpm","ghostscript-debuginfo-9.52-6.oe1.x86_64.rpm","ghostscript-tools-dvipdf-9.52-6.oe1.x86_64.rpm","ghostscript-debugsource-9.52-6.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"ghostscript","purl":"pkg:rpm/openEuler/ghostscript\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.52-6.oe1"}]}],"ecosystem_specific":{"aarch64":["ghostscript-debugsource-9.52-6.oe1.aarch64.rpm","ghostscript-debuginfo-9.52-6.oe1.aarch64.rpm","ghostscript-tools-dvipdf-9.52-6.oe1.aarch64.rpm","ghostscript-devel-9.52-6.oe1.aarch64.rpm","ghostscript-9.52-6.oe1.aarch64.rpm"],"noarch":["ghostscript-help-9.52-6.oe1.noarch.rpm"],"src":["ghostscript-9.52-6.oe1.src.rpm"],"x86_64":["ghostscript-debuginfo-9.52-6.oe1.x86_64.rpm","ghostscript-9.52-6.oe1.x86_64.rpm","ghostscript-debugsource-9.52-6.oe1.x86_64.rpm","ghostscript-devel-9.52-6.oe1.x86_64.rpm","ghostscript-tools-dvipdf-9.52-6.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1487"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45949"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45944"}],"database_specific":{"severity":"Medium"}}