diff options
author | Hongxu Jia <hongxu.jia@windriver.com> | 2018-11-05 16:03:35 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-11-06 11:54:30 +0000 |
commit | 6c32ea184941d292cd8f0eb898e6cc90120ada40 (patch) | |
tree | 65cb0c1bdfba62ecbbab1a93d1d8509a90278c50 /scripts/lib/checklayer/context.py | |
parent | bd8d2c25f595e30a3fdcad8a2409913bb8af7c5c (diff) | |
download | openembedded-core-6c32ea184941d292cd8f0eb898e6cc90120ada40.tar.gz openembedded-core-6c32ea184941d292cd8f0eb898e6cc90120ada40.tar.bz2 openembedded-core-6c32ea184941d292cd8f0eb898e6cc90120ada40.zip |
ghostscript: fix CVE-2018-17961
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a
sandbox protection mechanism via vectors involving errorhandler
setup. NOTE: this issue exists because of an incomplete fix for
CVE-2018-17183.
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/checklayer/context.py')
0 files changed, 0 insertions, 0 deletions