diff options
| author | Hongxu Jia <hongxu.jia@windriver.com> | 2018-11-05 16:03:36 +0800 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-11-06 11:54:30 +0000 |
| commit | 6098c19e1f179896af7013c4b5db3081549c97bc (patch) | |
| tree | 03349714444f010876d773ec16af365a060ab7fb /scripts/runqemu-export-rootfs | |
| parent | 6c32ea184941d292cd8f0eb898e6cc90120ada40 (diff) | |
| download | openembedded-core-6098c19e1f179896af7013c4b5db3081549c97bc.tar.gz openembedded-core-6098c19e1f179896af7013c4b5db3081549c97bc.tar.bz2 openembedded-core-6098c19e1f179896af7013c4b5db3081549c97bc.zip | |
ghostscript: fix CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection
mechanism by leveraging exposure of system operators in the saved
execution stack in an error object.
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/runqemu-export-rootfs')
0 files changed, 0 insertions, 0 deletions
