diff options
author | Hongxu Jia <hongxu.jia@windriver.com> | 2018-11-05 16:03:37 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-11-06 11:54:30 +0000 |
commit | 98ab5c5770d20b39bf3c58083f31f31838f2e940 (patch) | |
tree | 6d9f5b21faec87fc81180c41ae491d887538b43c /scripts/lib/devtool/runqemu.py | |
parent | 6098c19e1f179896af7013c4b5db3081549c97bc (diff) | |
download | openembedded-core-98ab5c5770d20b39bf3c58083f31f31838f2e940.tar.gz openembedded-core-98ab5c5770d20b39bf3c58083f31f31838f2e940.tar.bz2 openembedded-core-98ab5c5770d20b39bf3c58083f31f31838f2e940.zip |
ghostscript: fix CVE-2018-18284
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a
sandbox protection mechanism via vectors involving the 1Policy
operator.
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/devtool/runqemu.py')
0 files changed, 0 insertions, 0 deletions