Ghostscript is vulnerable to buffer overflow. The vulnerability exists due to a lack of sanitization in sampled_data_finish (called from sampled_data_continue and interp) in the heap.
bugs.chromium.org/p/oss-fuzz/issues/detail?id=34675
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=2a3129365d3bc0d4a41f107ef175920d1505d1f7
github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2021-803.yaml
lists.debian.org/debian-lts-announce/2022/01/msg00006.html
security-tracker.debian.org/tracker/CVE-2021-45949
www.debian.org/security/2022/dsa-5038