forked from pool/ghostscript
Security fix CVE-2023-43115 bsc#1215466 for ghostscript and ghostscript-mini OBS-URL: https://build.opensuse.org/request/show/1112466 OBS-URL: https://build.opensuse.org/package/show/Printing/ghostscript?expand=0&rev=165
21 lines
966 B
Diff
21 lines
966 B
Diff
--- devices/gdevijs.c.orig 2022-04-04 15:48:49.000000000 +0200
|
|
+++ devices/gdevijs.c 2023-09-20 08:18:09.178777690 +0200
|
|
@@ -888,6 +888,8 @@ gsijs_initialize_device(gx_device *dev)
|
|
static const char rgb[] = "DeviceRGB";
|
|
gx_device_ijs *ijsdev = (gx_device_ijs *)dev;
|
|
|
|
+ if (ijsdev->memory->gs_lib_ctx->core->path_control_active)
|
|
+ return_error(gs_error_invalidaccess);
|
|
if (!ijsdev->ColorSpace) {
|
|
ijsdev->ColorSpace = gs_malloc(ijsdev->memory, sizeof(rgb), 1,
|
|
"gsijs_initialize");
|
|
@@ -1326,7 +1328,7 @@ gsijs_put_params(gx_device *dev, gs_para
|
|
if (code >= 0)
|
|
code = gsijs_read_string(plist, "IjsServer",
|
|
ijsdev->IjsServer, sizeof(ijsdev->IjsServer),
|
|
- dev->LockSafetyParams, is_open);
|
|
+ ijsdev->memory->gs_lib_ctx->core->path_control_active, is_open);
|
|
|
|
if (code >= 0)
|
|
code = gsijs_read_string_malloc(plist, "DeviceManufacturer",
|