Files
poky/meta/recipes-extended
Catalin Enache 1fb5079557 ghostscript : CVE-2016-10219, CVE-2016-10220, CVE-2017-5951
The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript
9.20 allows remote attackers to cause a denial of service (divide-by-zero
error and application crash) via a crafted file.

The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc.
Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted file that is
mishandled in the PDF Transparency module.

The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc.
Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10219
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10220
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5951

Upstream patches:
http://git.ghostscript.com/?p=ghostpdl.git;h=4bef1a1d32e29b68855616020dbff574b9cda08f
http://git.ghostscript.com/?p=ghostpdl.git;h=daf85701dab05f17e924a48a81edc9195b4a04e8
http://git.ghostscript.com/?p=ghostpdl.git;h=bfa6b2ecbe48edc69a7d9d22a12419aed25960b8

(From OE-Core rev: 6679a4d4379f6f18554ed0042546cce94d5d0b19)

(From OE-Core rev: 55fa8b210139509859258c0ee11b3534f10fa509)

Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2017-05-18 13:07:34 +01:00
..
2017-05-18 13:07:32 +01:00
2015-01-16 23:08:25 +00:00
2016-07-20 10:28:51 +01:00
2016-07-20 10:28:52 +01:00
2016-01-24 09:40:29 +00:00
2016-05-30 15:58:11 +01:00
2016-08-04 15:22:23 +01:00
2016-07-20 10:28:51 +01:00
2016-02-15 16:28:46 +00:00
2016-07-10 14:12:16 +01:00
2016-07-08 09:57:24 +01:00
2016-07-08 09:57:24 +01:00
2016-09-20 15:11:07 +01:00
2016-06-15 08:35:03 +01:00
2016-08-25 22:54:49 +01:00
2016-01-07 13:40:17 +00:00
2016-01-15 11:54:50 +00:00
2016-09-09 12:12:22 +01:00
2016-09-28 10:16:03 +01:00
2016-09-09 12:12:22 +01:00
2016-09-08 00:32:43 +01:00
2016-08-25 23:03:48 +01:00
2016-09-03 09:58:40 +01:00
2016-08-17 10:35:43 +01:00
2016-06-04 14:13:34 +01:00
2015-02-03 14:53:52 +00:00
2016-06-04 14:13:35 +01:00
2016-07-26 08:56:27 +01:00
2016-06-03 13:13:25 +01:00
2016-01-24 09:40:27 +00:00
2016-07-08 09:57:24 +01:00
2016-10-05 10:10:51 +01:00
2016-08-10 10:46:30 +01:00
2016-05-19 09:05:20 +01:00
2015-11-16 11:39:37 +00:00
2016-07-20 10:28:51 +01:00
2016-09-05 11:56:02 +01:00
2017-05-18 13:07:32 +01:00
2017-05-18 13:07:32 +01:00
2017-05-18 13:07:32 +01:00
2016-09-03 09:58:38 +01:00
2016-09-09 11:53:36 +01:00
2016-07-08 09:57:24 +01:00
2016-01-24 09:40:28 +00:00
2016-05-19 22:32:07 +01:00