]> code.ossystems Code Review - openembedded-core.git/commit
ghostscript : CVE-2016-10219, CVE-2016-10220, CVE-2017-5951
authorCatalin Enache <catalin.enache@windriver.com>
Fri, 21 Apr 2017 12:04:17 +0000 (15:04 +0300)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 18 May 2017 12:04:50 +0000 (13:04 +0100)
commit55fa8b210139509859258c0ee11b3534f10fa509
tree3c8be5d4f1f08a3c771f87bd48968d48b1fd3793
parent3497bb564fa3bb1d6b938630cd660ee77bec5ab7
ghostscript : CVE-2016-10219, CVE-2016-10220, CVE-2017-5951

The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript
9.20 allows remote attackers to cause a denial of service (divide-by-zero
error and application crash) via a crafted file.

The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc.
Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted file that is
mishandled in the PDF Transparency module.

The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc.
Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10219
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10220
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5951

Upstream patches:
http://git.ghostscript.com/?p=ghostpdl.git;h=4bef1a1d32e29b68855616020dbff574b9cda08f
http://git.ghostscript.com/?p=ghostpdl.git;h=daf85701dab05f17e924a48a81edc9195b4a04e8
http://git.ghostscript.com/?p=ghostpdl.git;h=bfa6b2ecbe48edc69a7d9d22a12419aed25960b8

(From OE-Core rev: 6679a4d4379f6f18554ed0042546cce94d5d0b19)

Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-extended/ghostscript/ghostscript/CVE-2016-10219.patch [new file with mode: 0644]
meta/recipes-extended/ghostscript/ghostscript/CVE-2016-10220.patch [new file with mode: 0644]
meta/recipes-extended/ghostscript/ghostscript/CVE-2017-5951.patch [new file with mode: 0644]
meta/recipes-extended/ghostscript/ghostscript_9.19.bb