Created attachment 217132 [details] Fixed CVE-2020-15900 Ghostscript SAFER Sandbox Breakout (CVE-2020-15900) This patch: https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5d499272b95a6b890a1397e11d20937de000d31b
Something wrong with patch? Tested build on 12.1 and 11.4 amd64.
(In reply to VVD from comment #1) Approved. Thanks.
A commit references this bug: Author: hrs Date: Sat Aug 15 02:34:43 UTC 2020 New revision: 544907 URL: https://svnweb.freebsd.org/changeset/ports/544907 Log: Fix a memory corruption issue which can allow overriding of file access controls. Security: CVE-2020-15900 Security: https://insomniasec.com/blog/ghostscript-cve-2020-15900 Obtained from: https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5d499 272b95a6b890a1397e11d20937de000d31b PR: 248580 Changes: head/print/ghostscript9-agpl-base/Makefile head/print/ghostscript9-agpl-base/files/patch-Resource_Init_FAPIcidfmap head/print/ghostscript9-agpl-base/files/patch-configure head/print/ghostscript9-agpl-base/files/patch-lcms2mt head/print/ghostscript9-agpl-base/files/patch-psi-zstring.c
Committed to head and will be merged to the quarterly branch. Thanks for the report.
(In reply to Hiroki Sato from comment #4) Thanks for the commit. Unfortunately the field "MFH" was not used, so ports-secteam was not informed. Please create a vuxml entry for the CVE, after that it is released for 2020Q3. Best regards joneum (ports-secteam)
^Triage: Leave merge-quarterly flag open ? until merged
A commit references this bug: Author: 0mp Date: Sun Jan 17 22:23:35 UTC 2021 New revision: 561880 URL: https://svnweb.freebsd.org/changeset/ports/561880 Log: Document ghostscript9-agpl-base vulnerability committed in r544907 PR: 248580 Requested by: joneum (ports-secteam) Reported by: VVD <vvd@unislabs.com> MFH: 2021Q1 Security: CVE-2020-15900 Changes: head/security/vuxml/vuln.xml