summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch')
-rw-r--r--meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch23
1 files changed, 12 insertions, 11 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch
index d0886c9120..e406086e8f 100644
--- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2017-7975.patch
@@ -1,6 +1,7 @@
1From 5e57e483298dae8b8d4ec9aab37a526736ac2e97 Mon Sep 17 00:00:00 2001 1From b39be1019b4acc1aa50c6026463c543332e95a31 Mon Sep 17 00:00:00 2001
2From: Shailesh Mistry <shailesh.mistry@hotmail.co.uk> 2From: Catalin Enache <catalin.enache@windriver.com>
3Date: Wed, 26 Apr 2017 22:12:14 +0100 3Date: Mon, 8 May 2017 16:18:14 +0300
4
4Subject: [PATCH] Bug 697693: Prevent SEGV due to integer overflow. 5Subject: [PATCH] Bug 697693: Prevent SEGV due to integer overflow.
5 6
6While building a Huffman table, the start and end points were susceptible 7While building a Huffman table, the start and end points were susceptible
@@ -12,15 +13,17 @@ Upstream-Status: Backport
12CVE: CVE-2017-7975 13CVE: CVE-2017-7975
13 14
14Signed-off-by: Catalin Enache <catalin.enache@windriver.com> 15Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
15---
16 jbig2dec/jbig2_huffman.c | 4 ++--
17 1 file changed, 2 insertions(+), 2 deletions(-)
18 16
19diff --git a/jbig2dec/jbig2_huffman.c b/jbig2dec/jbig2_huffman.c 17Contents of this patch were extracted from a larger patch which addressed
20index 511e461..b4189a1 100644 18two CVE's. The context (location of {) was also modified to apply to
19ghostscript 9.21.
20
21Signed-off-by: Joe Slater <joe.slater@windriver.com>
22
23
21--- a/jbig2dec/jbig2_huffman.c 24--- a/jbig2dec/jbig2_huffman.c
22+++ b/jbig2dec/jbig2_huffman.c 25+++ b/jbig2dec/jbig2_huffman.c
23@@ -421,8 +421,8 @@ jbig2_build_huffman_table(Jbig2Ctx *ctx, const Jbig2HuffmanParams *params) 26@@ -421,8 +421,8 @@ jbig2_build_huffman_table(Jbig2Ctx *ctx,
24 27
25 if (PREFLEN == CURLEN) { 28 if (PREFLEN == CURLEN) {
26 int RANGELEN = lines[CURTEMP].RANGELEN; 29 int RANGELEN = lines[CURTEMP].RANGELEN;
@@ -31,6 +34,4 @@ index 511e461..b4189a1 100644
31 byte eflags = 0; 34 byte eflags = 0;
32 35
33 if (end_j > max_j) { 36 if (end_j > max_j) {
34--
352.10.2
36 37