Accepting request 1100802 from home:jsmeix:branches:Printing
Security fix CVE-2023-38559 bsc#1213637 for ghostscript and ghostscript-mini OBS-URL: https://build.opensuse.org/request/show/1100802 OBS-URL: https://build.opensuse.org/package/show/Printing/ghostscript?expand=0&rev=163
This commit is contained in:
parent
ec0f9996ce
commit
e235e5412f
11
CVE-2023-38559.patch
Normal file
11
CVE-2023-38559.patch
Normal file
@ -0,0 +1,11 @@
|
||||
--- base/gdevdevn.c.orig 2022-04-04 15:48:49.000000000 +0200
|
||||
+++ base/gdevdevn.c 2023-07-26 11:31:03.873226054 +0200
|
||||
@@ -1950,7 +1950,7 @@ devn_pcx_write_rle(const byte * from, co
|
||||
byte data = *from;
|
||||
|
||||
from += step;
|
||||
- if (data != *from || from == end) {
|
||||
+ if (from >= end || data != *from) {
|
||||
if (data >= 0xc0)
|
||||
gp_fputc(0xc1, file);
|
||||
} else {
|
@ -1,3 +1,15 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jul 26 09:35:33 UTC 2023 - Johannes Meixner <jsmeix@suse.com>
|
||||
|
||||
- CVE-2023-38559.patch fixes CVE-2023-38559
|
||||
"out of bounds read devn_pcx_write_rle() could result in DoS"
|
||||
see bsc#1213637
|
||||
and https://bugs.ghostscript.com/show_bug.cgi?id=706897
|
||||
which is in base/gdevdevn.c the same issue
|
||||
"ordering in if expression to avoid out-of-bounds access"
|
||||
as the already fixed CVE-2020-16305 in devices/gdevpcx.c
|
||||
see https://bugs.ghostscript.com/show_bug.cgi?id=701819
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 4 06:16:33 UTC 2023 - Johannes Meixner <jsmeix@suse.com>
|
||||
|
||||
|
@ -65,6 +65,17 @@ Patch102: CVE-2023-28879.patch
|
||||
# and https://bugzilla.suse.com/show_bug.cgi?id=1212711
|
||||
# "permission validation mishandling for pipe devices (with the %pipe% prefix or the | pipe character prefix)"
|
||||
Patch103: CVE-2023-36664.patch
|
||||
# Patch104 CVE-2023-38559.patch is for Ghostscript-9.56.1 from
|
||||
# https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1
|
||||
# that fixes CVE-2023-38559
|
||||
# "out of bounds read devn_pcx_write_rle() could result in DoS"
|
||||
# see https://bugzilla.suse.com/show_bug.cgi?id=1213637
|
||||
# and https://bugs.ghostscript.com/show_bug.cgi?id=706897
|
||||
# which is in base/gdevdevn.c the same issue
|
||||
# "ordering in if expression to avoid out-of-bounds access"
|
||||
# as the already fixed CVE-2020-16305 in devices/gdevpcx.c
|
||||
# see https://bugs.ghostscript.com/show_bug.cgi?id=701819
|
||||
Patch104: CVE-2023-38559.patch
|
||||
BuildRequires: freetype2-devel
|
||||
BuildRequires: libjpeg-devel
|
||||
BuildRequires: liblcms2-devel
|
||||
@ -281,6 +292,17 @@ This package contains the development files for Ghostscript.
|
||||
# and https://bugzilla.suse.com/show_bug.cgi?id=1212711
|
||||
# "permission validation mishandling for pipe devices (with the %pipe% prefix or the | pipe character prefix)"
|
||||
%patch103
|
||||
# Patch104 CVE-2023-38559.patch is for Ghostscript-9.56.1 from
|
||||
# https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=d81b82c70bc1
|
||||
# that fixes CVE-2023-38559
|
||||
# "out of bounds read devn_pcx_write_rle() could result in DoS"
|
||||
# see https://bugzilla.suse.com/show_bug.cgi?id=1213637
|
||||
# and https://bugs.ghostscript.com/show_bug.cgi?id=706897
|
||||
# which is in base/gdevdevn.c the same issue
|
||||
# "ordering in if expression to avoid out-of-bounds access"
|
||||
# as the already fixed CVE-2020-16305 in devices/gdevpcx.c
|
||||
# see https://bugs.ghostscript.com/show_bug.cgi?id=701819
|
||||
%patch104
|
||||
# Remove patch backup files to avoid packaging
|
||||
# cf. https://build.opensuse.org/request/show/581052
|
||||
rm -f Resource/Init/*.ps.orig
|
||||
|
Loading…
Reference in New Issue
Block a user