mirror of
https://git.yoctoproject.org/poky
synced 2026-04-18 12:32:12 +02:00
ghostscript: CVE-2019-14869
A flaw was found in all versions of ghostscript 9.x before 9.28, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands. References: https://nvd.nist.gov/vuln/detail/CVE-2019-14869 Upstream patches: https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=485904 (From OE-Core rev: 0bb88ac63b4e1728373c6425477a32f7a6362b2c) (From OE-Core rev: 9827b7df6f008f4384bbe22beeb0fe6adfeb36d6) Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
5d50b0549e
commit
bb702471b5
@@ -0,0 +1,70 @@
|
||||
From 485904772c5f0aa1140032746e5a0abfc40f4cef Mon Sep 17 00:00:00 2001
|
||||
From: Chris Liddell <chris.liddell@artifex.com>
|
||||
Date: Tue, 5 Nov 2019 09:45:27 +0000
|
||||
Subject: [PATCH] Bug 701841: remove .forceput from /.charkeys
|
||||
|
||||
When loading Type 1 or Truetype fonts from disk, we attempt to extend the glyph
|
||||
name table to include all identifiable glyph names from the Adobe Glyph List.
|
||||
|
||||
In the case of Type 1 fonts, the font itself (almost always) marks the
|
||||
CharStrings dictionary as read-only, hence we have to use .forceput for that
|
||||
case.
|
||||
|
||||
But for Truetype fonts, the CharStrings dictionary is created internally and is
|
||||
not read-only until *after* we have fully populated it (including the extended
|
||||
glyph names from the AGL), hence there is no need for .forceput, and no need to
|
||||
carry the security risk of using it.
|
||||
|
||||
Replace with regular put.
|
||||
|
||||
CVE: CVE-2019-14869
|
||||
Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git]
|
||||
|
||||
Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com>
|
||||
---
|
||||
Resource/Init/gs_ttf.ps | 8 ++++----
|
||||
1 file changed, 4 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/Resource/Init/gs_ttf.ps b/Resource/Init/gs_ttf.ps
|
||||
index e34967d..5354ff0 100644
|
||||
--- a/Resource/Init/gs_ttf.ps
|
||||
+++ b/Resource/Init/gs_ttf.ps
|
||||
@@ -1301,7 +1301,7 @@ currentdict /.pickcmap_with_no_xlatmap .undef
|
||||
TTFDEBUG { (\n1 setting alias: ) print dup ==only
|
||||
( to be the same as ) print 2 index //== exec } if
|
||||
|
||||
- 7 index 2 index 3 -1 roll exch .forceput
|
||||
+ 7 index 2 index 3 -1 roll exch put
|
||||
} forall
|
||||
pop pop pop
|
||||
}
|
||||
@@ -1319,7 +1319,7 @@ currentdict /.pickcmap_with_no_xlatmap .undef
|
||||
exch pop
|
||||
TTFDEBUG { (\n2 setting alias: ) print 1 index ==only
|
||||
( to use glyph index: ) print dup //== exec } if
|
||||
- 5 index 3 1 roll .forceput
|
||||
+ 5 index 3 1 roll put
|
||||
//false
|
||||
}
|
||||
{
|
||||
@@ -1336,7 +1336,7 @@ currentdict /.pickcmap_with_no_xlatmap .undef
|
||||
{ % CharStrings(dict) isunicode(boolean) cmap(dict) RAGL(dict) gname(name) codep(integer) gindex(integer)
|
||||
TTFDEBUG { (\3 nsetting alias: ) print 1 index ==only
|
||||
( to be index: ) print dup //== exec } if
|
||||
- exch pop 5 index 3 1 roll .forceput
|
||||
+ exch pop 5 index 3 1 roll put
|
||||
}
|
||||
{
|
||||
pop pop
|
||||
@@ -1366,7 +1366,7 @@ currentdict /.pickcmap_with_no_xlatmap .undef
|
||||
} ifelse
|
||||
]
|
||||
TTFDEBUG { (Encoding: ) print dup === flush } if
|
||||
-} .bind executeonly odef % hides .forceput
|
||||
+} .bind odef
|
||||
|
||||
% ---------------- CIDFontType 2 font loading ---------------- %
|
||||
|
||||
--
|
||||
2.20.1
|
||||
|
||||
@@ -28,6 +28,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d
|
||||
file://CVE-2019-14811-0001.patch \
|
||||
file://CVE-2019-14817-0001.patch \
|
||||
file://CVE-2019-14817-0002.patch \
|
||||
file://CVE-2019-14869-0001.patch \
|
||||
"
|
||||
|
||||
SRC_URI = "${SRC_URI_BASE} \
|
||||
|
||||
Reference in New Issue
Block a user