]> code.ossystems Code Review - openembedded-core.git/commit
ghostscript: CVE-2019-14869
authorStefan Ghinea <stefan.ghinea@windriver.com>
Thu, 21 Nov 2019 15:28:04 +0000 (17:28 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Mon, 25 Nov 2019 17:56:34 +0000 (17:56 +0000)
commit0bb88ac63b4e1728373c6425477a32f7a6362b2c
tree13199d39313eaeac5c7899a55a547afb65fe3f82
parent3bb0a089840caf51065d7f8b59b3e055bce31e1c
ghostscript: CVE-2019-14869

A flaw was found in all versions of ghostscript 9.x before 9.28,
where the `.charkeys` procedure, where it did not properly secure
its privileged calls, enabling scripts to bypass `-dSAFER` restrictions.
An attacker could abuse this flaw by creating a specially crafted
PostScript file that could escalate privileges within the Ghostscript
and access files outside of restricted areas or execute commands.

References:
https://nvd.nist.gov/vuln/detail/CVE-2019-14869

Upstream patches:
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=485904

Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14869-0001.patch [new file with mode: 0644]
meta/recipes-extended/ghostscript/ghostscript_9.27.bb