diff options
author | Stefan Ghinea <stefan.ghinea@windriver.com> | 2019-11-21 17:28:04 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2019-11-25 17:57:23 +0000 |
commit | fb458983d67e8f8dcbb89354f4bfd71d75070f3e (patch) | |
tree | 4631f78d26c17e4f2e4250c4159178ce18fe484c /meta/recipes-multimedia | |
parent | 6675b184334b186d0967fe43af7735395f87e4d7 (diff) | |
download | poky-fb458983d67e8f8dcbb89354f4bfd71d75070f3e.tar.gz |
ghostscript: CVE-2019-14869
A flaw was found in all versions of ghostscript 9.x before 9.28,
where the `.charkeys` procedure, where it did not properly secure
its privileged calls, enabling scripts to bypass `-dSAFER` restrictions.
An attacker could abuse this flaw by creating a specially crafted
PostScript file that could escalate privileges within the Ghostscript
and access files outside of restricted areas or execute commands.
References:
https://nvd.nist.gov/vuln/detail/CVE-2019-14869
Upstream patches:
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=485904
(From OE-Core rev: 0bb88ac63b4e1728373c6425477a32f7a6362b2c)
Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia')
0 files changed, 0 insertions, 0 deletions