See https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/ for more details and https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a9bd3dec9fde for a potential fix from upstream. TODO: check if this patch applies and which version of ghostscript it applies to.
9.54.0 it seems https://git.alpinelinux.org/aports/commit/?id=e7bcfafffdc528a8ac2f44662806ea4c199305fb
Sorry about the delay. Ghostscript ports are now back to the pool (ports@) and not maintained by doceng@ anymore.
Ghostscript is at 9.56.1. Can this be closed?
MARKED AS SPAM
(In reply to Michael Osipov from comment #3) Since more than one vuln.xml entry claims every version less than 10.01.0 has more than one vulnerability, I suggest that this bug not be closed prior to 10.01.0 appearing in the ports tree.
print/ghostscript9 has been removed. print/ghostscript10 has been updated long time ago.