Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29903 | Exploit Issue Tracking Third Party Advisory |
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2021-237.yaml | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5038 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00006.html | Mailing List Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30715 | Third Party Advisory |
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7861fcad13c497728189feafb41cd57b5b50ea25 | Issue Tracking |
https://github.com/google/oss-fuzz-vulns/issues/16 | Issue Tracking |
Configurations
History
21 Jan 2022, 14:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
|
First Time |
Debian
Debian debian Linux |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/01/msg00006.html - Mailing List, Third Party Advisory | |
References | (MISC) https://github.com/google/oss-fuzz-vulns/issues/16 - Issue Tracking | |
References | (MISC) https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7861fcad13c497728189feafb41cd57b5b50ea25 - Issue Tracking | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5038 - Third Party Advisory | |
References | (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30715 - Third Party Advisory |
17 Jan 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Jan 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jan 2022, 14:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
References |
|
07 Jan 2022, 18:32
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CPE | cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:* | |
References | (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29903 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2021-237.yaml - Third Party Advisory | |
First Time |
Artifex
Artifex ghostscript |
|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
01 Jan 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp). |
01 Jan 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-01 00:15
Updated : 2022-01-21 14:41
NVD link : CVE-2021-45944
Mitre link : CVE-2021-45944
CVE.ORG link : CVE-2021-45944
JSON object : View
Products Affected
debian
- debian_linux
artifex
- ghostscript
CWE
CWE-416
Use After Free