summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-3781_2.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-extended/ghostscript/ghostscript/CVE-2021-3781_2.patch')
-rw-r--r--meta/recipes-extended/ghostscript/ghostscript/CVE-2021-3781_2.patch37
1 files changed, 37 insertions, 0 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-3781_2.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-3781_2.patch
new file mode 100644
index 0000000000..beade79eef
--- /dev/null
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-3781_2.patch
@@ -0,0 +1,37 @@
1From 9daf042fd7bb19e93388d89d9686a2fa4496f382 Mon Sep 17 00:00:00 2001
2From: Chris Liddell <chris.liddell@artifex.com>
3Date: Mon, 24 Aug 2020 09:24:31 +0100
4Subject: [PATCH] Coverity 361429: move "break" to correct place.
5
6We had to add the outputfile to the "control" file permission list (as well
7as write), but for the "pipe" case, I accidentally added the call after the
8break out of loop that checks for a pipe.
9
10CVE: CVE-2021-3781
11
12Upstream-Status: Backport:
13https://git.ghostscript.com/?p=ghostpdl.git;a=commit;f=base/gslibctx.c;h=9daf042fd7bb19e93388d89d9686a2fa4496f382
14
15Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
16---
17 base/gslibctx.c | 2 +-
18 1 file changed, 1 insertion(+), 1 deletion(-)
19
20diff --git a/base/gslibctx.c b/base/gslibctx.c
21index ff8fc895e..63dfbe2e0 100644
22--- a/base/gslibctx.c
23+++ b/base/gslibctx.c
24@@ -668,10 +668,10 @@ gs_add_outputfile_control_path(gs_memory_t *mem, const char *fname)
25 code = gs_add_control_path(mem, gs_permit_file_writing, f);
26 if (code < 0)
27 return code;
28- break;
29 code = gs_add_control_path(mem, gs_permit_file_control, f);
30 if (code < 0)
31 return code;
32+ break;
33 }
34 if (!IS_WHITESPACE(f[i]))
35 break;
36--
372.25.1