<feed xmlns='http://www.w3.org/2005/Atom'>
<title>buildroot/package/ghostscript, branch 2017.02.2</title>
<subtitle>OpenPOWER buildroot sources</subtitle>
<id>https://git.raptorcs.com/git/buildroot/atom?h=2017.02.2</id>
<link rel='self' href='https://git.raptorcs.com/git/buildroot/atom?h=2017.02.2'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/'/>
<updated>2017-05-01T06:38:47+00:00</updated>
<entry>
<title>ghostscript: add upstream security fixes for CVE-2017-8291</title>
<updated>2017-05-01T06:38:47+00:00</updated>
<author>
<name>Peter Korsgaard</name>
<email>peter@korsgaard.com</email>
</author>
<published>2017-04-28T07:49:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=8879b99a50c3d6977222e289124d8d85765e8632'/>
<id>urn:sha1:8879b99a50c3d6977222e289124d8d85765e8632</id>
<content type='text'>
CVE-2017-8291 - Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass
and remote command execution via a "/OutputFile (%pipe%" substring in a
crafted .eps document that is an input to the gs program, as exploited in
the wild in April 2017.

For more details, see https://bugzilla.suse.com/show_bug.cgi?id=1036453

Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
(cherry picked from commit 874becfd019bc8f4e126684d08c4164e984b11c3)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
</feed>
