diff options
author | Anuj Mittal <anuj.mittal@intel.com> | 2019-11-27 08:53:24 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2019-11-29 17:43:28 +0000 |
commit | afef29326b4332fc87c53a5d9d43288cddcdd944 (patch) | |
tree | 519e8b9a10105e2408afdd3cb4d5f1f99034c866 /meta/recipes-extended/ghostscript | |
parent | 8a5fdac3c2d207b2cfac64ec2a2626c3ef154d84 (diff) | |
download | openembedded-core-contrib-afef29326b4332fc87c53a5d9d43288cddcdd944.tar.gz |
ghostscript: fix for CVE-2019-14811 is same as CVE-2019-14813
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813
https://www.openwall.com/lists/oss-security/2019/08/28/2
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-extended/ghostscript')
-rw-r--r-- | meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch index 3f28555e8a..d4ef0996ec 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch @@ -12,6 +12,7 @@ handler being used, but nevertheless, prevent access to .forceput from .setuserparams2. CVE: CVE-2019-14811 +CVE: CVE-2019-14813 Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> |