diff options
author | Ovidiu Panait <ovidiu.panait@windriver.com> | 2019-07-29 07:20:58 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2019-07-29 23:50:43 +0100 |
commit | e6058824bbd6c9786368d79fa5a69c230219d112 (patch) | |
tree | 9a5062fe31b796da05b7e10d133acfdd8b349f15 /meta/recipes-extended/ghostscript/ghostscript_9.26.bb | |
parent | 885459d264e8fa1472142ff0ce02cbce91e630a0 (diff) | |
download | poky-e6058824bbd6c9786368d79fa5a69c230219d112.tar.gz |
ghostscript: Fix 3 CVEs
It was discovered that the ghostscript /invalidaccess checks fail under
certain conditions. An attacker could possibly exploit this to bypass
the -dSAFER protection and, for example, execute arbitrary shell commands
via a specially crafted PostScript document.
It was found that the superexec operator was available in the internal
dictionary in ghostscript before 9.27. A specially crafted PostScript
file could use this flaw in order to, for example, have access to the
file system outside of the constrains imposed by -dSAFER.
It was found that the forceput operator could be extracted from the
DefineResource method in ghostscript before 9.27. A specially crafted
PostScript file could use this flaw in order to, for example, have
access to the file system outside of the constrains imposed by -dSAFER.
References:
https://nvd.nist.gov/vuln/detail/CVE-2019-6116
https://www.openwall.com/lists/oss-security/2019/01/23/5
https://nvd.nist.gov/vuln/detail/CVE-2019-3835
https://nvd.nist.gov/vuln/detail/CVE-2019-3838
Upstream patches:
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=13b0a36
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2db98f9
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=99f1309
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=59d8f4d
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2768d1a
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=49c8092
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2ff600a
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=779664d
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=e8acf6d
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2055917
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d683d1e
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=ed9fcd9
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a82601e
(From OE-Core rev: 12e140dfdac8456772223c816e37bd869419bb18)
(From OE-Core rev: cf5d29dcac6247e8476f7af78b4e0bb129b94677)
Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
[Fix for CVE-2019-6116 is already in thud, so that has been removed]
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/ghostscript/ghostscript_9.26.bb')
-rw-r--r-- | meta/recipes-extended/ghostscript/ghostscript_9.26.bb | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.26.bb b/meta/recipes-extended/ghostscript/ghostscript_9.26.bb index ad4c5e17d2..bb32347880 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.26.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.26.bb | |||
@@ -39,6 +39,12 @@ SRC_URI = "${SRC_URI_BASE} \ | |||
39 | file://CVE-2019-6116-0005.patch \ | 39 | file://CVE-2019-6116-0005.patch \ |
40 | file://CVE-2019-6116-0006.patch \ | 40 | file://CVE-2019-6116-0006.patch \ |
41 | file://CVE-2019-6116-0007.patch \ | 41 | file://CVE-2019-6116-0007.patch \ |
42 | file://CVE-2019-3835-0001.patch \ | ||
43 | file://CVE-2019-3835-0002.patch \ | ||
44 | file://CVE-2019-3835-0003.patch \ | ||
45 | file://CVE-2019-3835-0004.patch \ | ||
46 | file://CVE-2019-3838-0001.patch \ | ||
47 | file://CVE-2019-3838-0002.patch \ | ||
42 | " | 48 | " |
43 | 49 | ||
44 | SRC_URI_class-native = "${SRC_URI_BASE} \ | 50 | SRC_URI_class-native = "${SRC_URI_BASE} \ |