Files
poky/meta/recipes-extended
Ovidiu Panait e6058824bb ghostscript: Fix 3 CVEs
It was discovered that the ghostscript /invalidaccess checks fail under
certain conditions. An attacker could possibly exploit this to bypass
the -dSAFER protection and, for example, execute arbitrary shell commands
via a specially crafted PostScript document.

It was found that the superexec operator was available in the internal
dictionary in ghostscript before 9.27. A specially crafted PostScript
file could use this flaw in order to, for example, have access to the
file system outside of the constrains imposed by -dSAFER.

It was found that the forceput operator could be extracted from the
DefineResource method in ghostscript before 9.27. A specially crafted
PostScript file could use this flaw in order to, for example, have
access to the file system outside of the constrains imposed by -dSAFER.

References:
https://nvd.nist.gov/vuln/detail/CVE-2019-6116
https://www.openwall.com/lists/oss-security/2019/01/23/5
https://nvd.nist.gov/vuln/detail/CVE-2019-3835
https://nvd.nist.gov/vuln/detail/CVE-2019-3838

Upstream patches:
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=13b0a36
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2db98f9
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=99f1309
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=59d8f4d
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2768d1a
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=49c8092
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2ff600a
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=779664d
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=e8acf6d
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2055917
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d683d1e
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=ed9fcd9
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a82601e

(From OE-Core rev: 12e140dfdac8456772223c816e37bd869419bb18)

(From OE-Core rev: cf5d29dcac6247e8476f7af78b4e0bb129b94677)

Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
[Fix for CVE-2019-6116 is already in thud, so that has been removed]
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2019-07-29 23:50:43 +01:00
..
2018-05-29 21:07:17 +01:00
2018-09-27 23:41:41 +01:00
2018-07-24 11:52:26 +01:00
2019-07-29 23:50:43 +01:00
2018-06-18 11:07:57 +01:00
2019-07-27 18:05:18 +01:00
2017-05-23 17:45:36 +01:00
2019-01-08 20:14:42 +00:00
2019-07-29 23:50:43 +01:00
2018-08-08 10:51:59 +01:00
2018-05-29 21:07:15 +01:00
2018-07-26 13:16:40 +01:00
2018-05-04 13:28:01 +01:00
2019-02-25 22:27:40 +00:00
2017-12-02 11:25:32 +00:00
2018-02-24 10:31:45 +00:00
2018-09-21 18:45:47 -07:00
2018-05-09 10:47:50 +01:00
2019-07-27 18:05:18 +01:00
2018-07-26 13:16:40 +01:00
2018-10-16 20:35:43 +01:00
2018-05-04 13:28:01 +01:00
2018-06-18 11:07:57 +01:00
2019-02-25 22:27:38 +00:00
2016-11-30 15:48:09 +00:00
2018-06-27 13:55:21 +01:00
2018-05-15 10:56:49 +01:00
2018-02-16 18:05:38 +00:00
2018-07-15 16:16:16 +01:00
2018-07-15 16:16:16 +01:00
2017-11-21 13:06:11 +00:00
2018-05-29 21:07:17 +01:00
2018-01-05 11:55:35 +00:00
2018-06-27 13:55:21 +01:00
2018-07-24 11:52:26 +01:00
2019-07-27 18:05:18 +01:00
2017-11-05 22:33:22 +00:00
2018-05-04 13:28:05 +01:00
2019-05-22 00:31:47 +01:00
2019-07-27 18:05:18 +01:00
2018-06-18 11:07:57 +01:00
2018-07-24 11:52:26 +01:00