summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorArchana Polampalli <archana.polampalli@windriver.com>2024-08-08 11:05:43 +0000
committerSteve Sakoman <steve@sakoman.com>2024-08-16 08:09:14 -0700
commit5c036f07cc71c472be72f63d085b6a65afc5ce81 (patch)
treeae9ca31be906af8967a6c0488c559832ba581f5e
parent52cfc786965eb818cb23846d24d827627cbdd4e6 (diff)
downloadpoky-5c036f07cc71c472be72f63d085b6a65afc5ce81.tar.gz
ghostscript: fix CVE-2024-29506
(From OE-Core rev: 68a6482244532e61bc467e1ef23661260bac8572) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-extended/ghostscript/ghostscript/CVE-2024-29506.patch45
-rw-r--r--meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb1
2 files changed, 46 insertions, 0 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2024-29506.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2024-29506.patch
new file mode 100644
index 0000000000..9f3f3e5da2
--- /dev/null
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2024-29506.patch
@@ -0,0 +1,45 @@
1From 77dc7f699beba606937b7ea23b50cf5974fa64b1 Mon Sep 17 00:00:00 2001
2From: Ken Sharp <Ken.Sharp@artifex.com>
3Date: Thu, 25 Jan 2024 11:55:49 +0000
4Subject: [PATCH] Bug 707510 - don't allow PDF files with bad Filters to
5 overflow the debug buffer
6
7Item #2 of the report.
8
9Allocate a buffer to hold the filter name, instead of assuming it will
10fit in a fixed buffer.
11
12Reviewed all the other PDFDEBUG cases, no others use a fixed buffer like
13this.
14
15CVE: CVE-2024-29506
16
17Upstream-Status: Backport [https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=77dc7f699beba606937b7ea23b50cf5974fa64b1]
18
19Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
20---
21 pdf/pdf_file.c | 6 +++++-
22 1 file changed, 5 insertions(+), 1 deletion(-)
23
24diff --git a/pdf/pdf_file.c b/pdf/pdf_file.c
25index 214d448..93c2402 100644
26--- a/pdf/pdf_file.c
27+++ b/pdf/pdf_file.c
28@@ -767,10 +767,14 @@ static int pdfi_apply_filter(pdf_context *ctx, pdf_dict *dict, pdf_name *n, pdf_
29
30 if (ctx->args.pdfdebug)
31 {
32- char str[100];
33+ char *str;
34+ str = gs_alloc_bytes(ctx->memory, n->length + 1, "temp string for debug");
35+ if (str == NULL)
36+ return_error(gs_error_VMerror);
37 memcpy(str, (const char *)n->data, n->length);
38 str[n->length] = '\0';
39 dmprintf1(ctx->memory, "FILTER NAME:%s\n", str);
40+ gs_free_object(ctx->memory, str, "temp string for debug");
41 }
42
43 if (pdfi_name_is(n, "RunLengthDecode")) {
44--
452.40.0
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
index f738b0133f..525086e2af 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
@@ -53,6 +53,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d
53 file://CVE-2024-29511-0001.patch \ 53 file://CVE-2024-29511-0001.patch \
54 file://CVE-2024-29511-0002.patch \ 54 file://CVE-2024-29511-0002.patch \
55 file://CVE-2024-29509.patch \ 55 file://CVE-2024-29509.patch \
56 file://CVE-2024-29506.patch \
56" 57"
57 58
58SRC_URI = "${SRC_URI_BASE} \ 59SRC_URI = "${SRC_URI_BASE} \