/[packages]/updates/5/ghostscript/current/SOURCES/ghostscript-9.20-CVE-2016-7977.patch
ViewVC logotype

Contents of /updates/5/ghostscript/current/SOURCES/ghostscript-9.20-CVE-2016-7977.patch

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1097910 - (show annotations) (download)
Fri Apr 28 12:05:54 2017 UTC (6 years, 11 months ago) by neoclust
File size: 893 byte(s)
New version - Fixes CVE-2016-797[6-9], CVE-2016-8602, CVE-2016-9601, CVE-2017-7207 CVE-2017-8291
1 From cf046d2f0fa2c6973c6ca8d582a9b185cc4bd280 Mon Sep 17 00:00:00 2001
2 From: Chris Liddell <chris.liddell@artifex.com>
3 Date: Mon, 3 Oct 2016 01:46:28 +0100
4 Subject: [PATCH] Bug 697169: Be rigorous with SAFER permissions
5
6 Once we've opened our input file from the command line, enforce the SAFER
7 rules.
8 ---
9 psi/zfile.c | 3 +++
10 1 file changed, 3 insertions(+)
11
12 diff --git a/psi/zfile.c b/psi/zfile.c
13 index b6caea2..2c6c958 100644
14 --- a/psi/zfile.c
15 +++ b/psi/zfile.c
16 @@ -1081,6 +1081,9 @@ lib_file_open(gs_file_path_ptr lib_path, const gs_memory_t *mem, i_ctx_t *i_ctx
17 gs_main_instance *minst = get_minst_from_memory(mem);
18 int code;
19
20 + if (i_ctx_p && starting_arg_file)
21 + i_ctx_p->starting_arg_file = false;
22 +
23 /* when starting arg files (@ files) iodev_default is not yet set */
24 if (iodev == 0)
25 iodev = (gx_io_device *)gx_io_device_table[0];
26 --
27 2.9.1
28

  ViewVC Help
Powered by ViewVC 1.1.30