Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | ghostscript: 9.25 -> 9.26 | Hongxu Jia | 2018-12-01 | 1 | -197/+0 |
| | | | | | | | | | | - Drop backported CVE fixes 000[1-8]*.patch (From OE-Core rev: f30bd6bf01dbf81f0872382be44d507fb981f953) Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> | ||||
* | ghostscript: fix CVE-2018-18073 | Hongxu Jia | 2018-11-07 | 1 | -0/+197 |
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object. (From OE-Core rev: 6098c19e1f179896af7013c4b5db3081549c97bc) Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> |