summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/ghostscript
diff options
context:
space:
mode:
authorAnuj Mittal <anuj.mittal@intel.com>2019-11-27 08:53:24 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2019-11-29 17:43:40 +0000
commit8e16704ae40b30f6eabdcce9a6c43e5d0ecc643c (patch)
tree959047b4f1f48add3e389e6ed777cc82050e2af6 /meta/recipes-extended/ghostscript
parent14e176db526b20279bde28ed1e4110ed7b31c0a1 (diff)
downloadpoky-8e16704ae40b30f6eabdcce9a6c43e5d0ecc643c.tar.gz
ghostscript: fix for CVE-2019-14811 is same as CVE-2019-14813
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813 https://www.openwall.com/lists/oss-security/2019/08/28/2 (From OE-Core rev: afef29326b4332fc87c53a5d9d43288cddcdd944) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/ghostscript')
-rw-r--r--meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch
index 3f28555e8a..d4ef0996ec 100644
--- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch
@@ -12,6 +12,7 @@ handler being used, but nevertheless, prevent access to .forceput from
12.setuserparams2. 12.setuserparams2.
13 13
14CVE: CVE-2019-14811 14CVE: CVE-2019-14811
15CVE: CVE-2019-14813
15Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] 16Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git]
16 17
17Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> 18Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>