fix for CVE-2023-38559
Resolves: rhbz#2224371
This commit is contained in:
parent
4518d41903
commit
f9092f6545
27
ghostscript-9.27-CVE-2023-38559.patch
Normal file
27
ghostscript-9.27-CVE-2023-38559.patch
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
From d81b82c70bc1fb9991bb95f1201abb5dea55f57f Mon Sep 17 00:00:00 2001
|
||||||
|
From: Chris Liddell <chris.liddell@artifex.com>
|
||||||
|
Date: Mon, 17 Jul 2023 14:06:37 +0100
|
||||||
|
Subject: [PATCH] Bug 706897: Copy pcx buffer overrun fix from
|
||||||
|
devices/gdevpcx.c
|
||||||
|
|
||||||
|
Bounds check the buffer, before dereferencing the pointer.
|
||||||
|
---
|
||||||
|
base/gdevdevn.c | 2 +-
|
||||||
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/base/gdevdevn.c b/base/gdevdevn.c
|
||||||
|
index 7b14d9c71..6351fb77a 100644
|
||||||
|
--- a/base/gdevdevn.c
|
||||||
|
+++ b/base/gdevdevn.c
|
||||||
|
@@ -1983,7 +1983,7 @@ devn_pcx_write_rle(const byte * from, const byte * end, int step, gp_file * file
|
||||||
|
byte data = *from;
|
||||||
|
|
||||||
|
from += step;
|
||||||
|
- if (data != *from || from == end) {
|
||||||
|
+ if (from >= end || data != *from) {
|
||||||
|
if (data >= 0xc0)
|
||||||
|
putc(0xc1, file);
|
||||||
|
} else {
|
||||||
|
--
|
||||||
|
2.41.0
|
||||||
|
|
@ -37,7 +37,7 @@
|
|||||||
Name: ghostscript
|
Name: ghostscript
|
||||||
Summary: Interpreter for PostScript language & PDF
|
Summary: Interpreter for PostScript language & PDF
|
||||||
Version: 9.27
|
Version: 9.27
|
||||||
Release: 9%{?dist}
|
Release: 10%{?dist}
|
||||||
|
|
||||||
License: AGPLv3+
|
License: AGPLv3+
|
||||||
|
|
||||||
@ -110,6 +110,7 @@ Patch017: ghostscript-9.27-ESC-Page-driver-does-not-set-page-size-correctly.patc
|
|||||||
Patch018: ghostscript-9.27-fix-bbox.patch
|
Patch018: ghostscript-9.27-fix-bbox.patch
|
||||||
Patch019: ghostscript-9.27-pdfwrite-Substituted-TTF-CIDFont-CID-hand.patch
|
Patch019: ghostscript-9.27-pdfwrite-Substituted-TTF-CIDFont-CID-hand.patch
|
||||||
Patch020: ghostscript-9.27-CVE-2023-28879.patch
|
Patch020: ghostscript-9.27-CVE-2023-28879.patch
|
||||||
|
Patch021: ghostscript-9.27-CVE-2023-38559.patch
|
||||||
|
|
||||||
|
|
||||||
# Downstream patches -- these should be always included when doing rebase:
|
# Downstream patches -- these should be always included when doing rebase:
|
||||||
@ -450,6 +451,10 @@ done
|
|||||||
# =============================================================================
|
# =============================================================================
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Aug 04 2023 Richard Lescak <rlescak@redhat.com> - 9.27-10
|
||||||
|
- fix for CVE-2023-38559
|
||||||
|
- Resolves: rhbz#2224371
|
||||||
|
|
||||||
* Fri May 05 2023 Richard Lescak <rlescak@redhat.com> - 9.27-9
|
* Fri May 05 2023 Richard Lescak <rlescak@redhat.com> - 9.27-9
|
||||||
- fix for CVE-2023-28879
|
- fix for CVE-2023-28879
|
||||||
- Resolves: rhbz#2188297
|
- Resolves: rhbz#2188297
|
||||||
|
Loading…
Reference in New Issue
Block a user