{"affected":[{"ecosystem_specific":{"binaries":[{"ghostscript-devel":"9.52-23.71.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"ghostscript","purl":"pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.52-23.71.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ghostscript":"9.52-23.71.1","ghostscript-devel":"9.52-23.71.1","ghostscript-x11":"9.52-23.71.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"ghostscript","purl":"pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.52-23.71.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ghostscript":"9.52-23.71.1","ghostscript-devel":"9.52-23.71.1","ghostscript-x11":"9.52-23.71.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"ghostscript","purl":"pkg:rpm/suse/ghostscript&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"9.52-23.71.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ghostscript fixes the following issues:\n\n- Fixed segfaults in gs_heap_free_object() — ref:_00D1igLOd._500Tr4BRgx:ref (bsc#1219357).\n\nPreviously fixed security issue:\n\n- CVE-2020-36773: Fixed out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) (bsc#1219554). \n","id":"SUSE-SU-2024:0921-1","modified":"2024-03-18T10:30:11Z","published":"2024-03-18T10:30:11Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240921-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219554"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36773"}],"related":["CVE-2020-36773"],"summary":"Security update for ghostscript","upstream":["CVE-2020-36773"]}