Do you use Ghostscript library to parse content or convert file formats?
Hello, recently was news:
Google Project Zero's security researcher has discovered a critical remote code execution (RCE) vulnerability in Ghostscript—an open source interpreter for Adobe Systems' PostScript and PDF page description languages.
A lot of popular PDF and image editing software, including ImageMagick and GIMP, use Ghostscript library to parse the content and convert file formats.
I get it from: https://thehackernews.com/2018/08/ghostscript-postscript-vulnerability.html
And also you can find info here: https://bugs.chromium.org/p/project-zero/issues/detail?id=1640
Could you tell please, do you use Ghostscript library in poppler? I want to research poppler code on this issue. But it would be great if you answered me before =)