diff options
author | Vijay Anusuri <vanusuri@mvista.com> | 2023-10-09 09:48:05 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-10-13 05:47:07 -1000 |
commit | eebb034b2195f6b27ac17f436653db28ebdcfa4c (patch) | |
tree | da8a9067c10947dda7e7f98a30291c6585832f6e /meta/recipes-core/busybox/busybox_1.31.1.bb | |
parent | e4d507b93bece23276bd7785c5fad26ffc1a5cb0 (diff) | |
download | poky-eebb034b2195f6b27ac17f436653db28ebdcfa4c.tar.gz |
ghostscript: Backport fix CVE-2023-43115
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote
code execution via crafted PostScript documents because they can switch to the
IJS device, or change the IjsServer parameter, after SAFER has been activated.
NOTE: it is a documented risk that the IJS server can be specified on a gs
command line (the IJS device inherently must execute a command to start the IJS server).
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-43115
Upstream commit:
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e59216049cac290fb437a04c4f41ea46826cfba5
(From OE-Core rev: a43f7277061ee6c30c42c9318e3e9dd076563f5d)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-core/busybox/busybox_1.31.1.bb')
0 files changed, 0 insertions, 0 deletions