CVE-2021-3781 log

Source
Severity High
Remote Yes
Type Arbitrary command execution
Description
A trivial sandbox (enabled with the -dSAFER option) escape security issue was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter.
Group Package Affected Fixed Severity Status Ticket
AVG-2374 ghostscript 9.54.0-2 9.54.0-3 High Fixed
Date Advisory Group Package Severity Type
14 Sep 2021 ASA-202109-3 AVG-2374 ghostscript High arbitrary command execution
References
https://bugzilla.redhat.com/show_bug.cgi?id=2002271
https://bugs.ghostscript.com/show_bug.cgi?id=704342
https://twitter.com/emil_lerner/status/1430502815181463559
https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a9bd3dec9fde03327a4a2c69dad1036bf9632e20