diff options
author | Catalin Enache <catalin.enache@windriver.com> | 2017-04-05 15:06:51 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-05-18 13:07:34 +0100 |
commit | 0c5ab30a30bfa6c1f13d758339207083b6a281e7 (patch) | |
tree | 2ad207224147ee8ec8be703486869201b952fec9 /meta-skeleton | |
parent | 3b12b433c0abd4d28eab7412f3efa6fc747759ea (diff) | |
download | poky-0c5ab30a30bfa6c1f13d758339207083b6a281e7.tar.gz |
ghostscript: CVE-2017-7207
The mem_get_bits_rectangle function in Artifex Software, Inc.
Ghostscript 9.20 allows remote attackers to cause a denial
of service (NULL pointer dereference) via a crafted PostScript
document.
Reference:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7207
Upstream patch:
http://git.ghostscript.com/?p=ghostpdl.git;h=309eca4e0a31ea70dcc844812691439312dad091
(From OE-Core rev: 0f22a27c2abd2f2dd9119681f139dd85dcb6479d)
(From OE-Core rev: 3497bb564fa3bb1d6b938630cd660ee77bec5ab7)
Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta-skeleton')
0 files changed, 0 insertions, 0 deletions