Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).
References
Configurations
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29903 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30715 - Third Party Advisory | |
References | () https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=7861fcad13c497728189feafb41cd57b5b50ea25 - | |
References | () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2021-237.yaml - Third Party Advisory | |
References | () https://github.com/google/oss-fuzz-vulns/issues/16 - Issue Tracking | |
References | () https://lists.debian.org/debian-lts-announce/2022/01/msg00006.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5038 - Third Party Advisory |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-01-01 00:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45944
Mitre link : CVE-2021-45944
CVE.ORG link : CVE-2021-45944
JSON object : View
Products Affected
artifex
- ghostscript
debian
- debian_linux
CWE
CWE-416
Use After Free