diff options
author | Hongxu Jia <hongxu.jia@windriver.com> | 2018-11-05 16:03:36 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-11-06 11:54:30 +0000 |
commit | 6098c19e1f179896af7013c4b5db3081549c97bc (patch) | |
tree | 03349714444f010876d773ec16af365a060ab7fb /scripts/lib/checklayer/context.py | |
parent | 6c32ea184941d292cd8f0eb898e6cc90120ada40 (diff) | |
download | openembedded-core-6098c19e1f179896af7013c4b5db3081549c97bc.tar.gz openembedded-core-6098c19e1f179896af7013c4b5db3081549c97bc.tar.bz2 openembedded-core-6098c19e1f179896af7013c4b5db3081549c97bc.zip |
ghostscript: fix CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection
mechanism by leveraging exposure of system operators in the saved
execution stack in an error object.
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/checklayer/context.py')
0 files changed, 0 insertions, 0 deletions