https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813 https://www.openwall.com/lists/oss-security/2019/08/28/2
Signed-off-by: Anuj Mittal <[email protected]> --- .../ghostscript/ghostscript/CVE-2019-14811-0001.patch | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch index 3f28555e8a..d4ef0996ec 100644 --- a/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch +++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2019-14811-0001.patch @@ -12,6 +12,7 @@ handler being used, but nevertheless, prevent access to .forceput from .setuserparams2. CVE: CVE-2019-14811 +CVE: CVE-2019-14813 Upstream-Status: Backport [git://git.ghostscript.com/ghostpdl.git] Signed-off-by: Stefan Ghinea <[email protected]> -- 2.21.0 -- _______________________________________________ Openembedded-core mailing list [email protected] http://lists.openembedded.org/mailman/listinfo/openembedded-core
