diff options
author | Catalin Enache <catalin.enache@windriver.com> | 2017-04-05 15:06:51 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-04-08 22:48:04 +0100 |
commit | 0f22a27c2abd2f2dd9119681f139dd85dcb6479d (patch) | |
tree | b0f3ef817ae097ba4fbfa34232cc3f5c45f97c17 /meta/recipes-extended/cronie | |
parent | ee44dabc065912ac17f1ee5f06f12695c90b5482 (diff) | |
download | openembedded-core-contrib-0f22a27c2abd2f2dd9119681f139dd85dcb6479d.tar.gz |
ghostscript: CVE-2017-7207
The mem_get_bits_rectangle function in Artifex Software, Inc.
Ghostscript 9.20 allows remote attackers to cause a denial
of service (NULL pointer dereference) via a crafted PostScript
document.
Reference:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7207
Upstream patch:
http://git.ghostscript.com/?p=ghostpdl.git;h=309eca4e0a31ea70dcc844812691439312dad091
Signed-off-by: Catalin Enache <catalin.enache@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/cronie')
0 files changed, 0 insertions, 0 deletions