]> code.ossystems Code Review - openembedded-core.git/commit
ghostscript: CVE-2019-14869
authorStefan Ghinea <stefan.ghinea@windriver.com>
Thu, 21 Nov 2019 15:28:04 +0000 (17:28 +0200)
committerAnuj Mittal <anuj.mittal@intel.com>
Fri, 6 Dec 2019 05:14:48 +0000 (13:14 +0800)
commit9827b7df6f008f4384bbe22beeb0fe6adfeb36d6
tree586eb0d3cbdf8fd348f46d2f8f5df6e60dfff92d
parent75a4cabf55e13e6714c0fdb229cd51b5184ddbef
ghostscript: CVE-2019-14869

A flaw was found in all versions of ghostscript 9.x before 9.28,
where the `.charkeys` procedure, where it did not properly secure
its privileged calls, enabling scripts to bypass `-dSAFER` restrictions.
An attacker could abuse this flaw by creating a specially crafted
PostScript file that could escalate privileges within the Ghostscript
and access files outside of restricted areas or execute commands.

References:
https://nvd.nist.gov/vuln/detail/CVE-2019-14869

Upstream patches:
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=485904

(From OE-Core rev: 0bb88ac63b4e1728373c6425477a32f7a6362b2c)

Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14869-0001.patch [new file with mode: 0644]
meta/recipes-extended/ghostscript/ghostscript_9.27.bb