diff options
author | J0WI <J0WI@users.noreply.github.com> | 2019-08-29 23:21:40 +0200 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2019-09-03 14:19:27 +0000 |
commit | 47e96eb4a65356706c4e6344e74859d045d38237 (patch) | |
tree | 7cfadb5a6f21454e2f919940be7dfa38d79595c6 /main/ghostscript/APKBUILD | |
parent | 21cda98b4088fa861bf13a87262666d54673e54f (diff) | |
download | aports-47e96eb4a65356706c4e6344e74859d045d38237.tar.bz2 aports-47e96eb4a65356706c4e6344e74859d045d38237.tar.xz |
main/ghostscript: add security patches
Diffstat (limited to 'main/ghostscript/APKBUILD')
-rw-r--r-- | main/ghostscript/APKBUILD | 10 |
1 files changed, 8 insertions, 2 deletions
diff --git a/main/ghostscript/APKBUILD b/main/ghostscript/APKBUILD index 02999ebc1d..26b4e9fc19 100644 --- a/main/ghostscript/APKBUILD +++ b/main/ghostscript/APKBUILD @@ -2,7 +2,7 @@ # Maintainer: Cameron Banta <cbanta@gmail.com> pkgname=ghostscript pkgver=9.27 -pkgrel=2 +pkgrel=3 pkgdesc="An interpreter for the PostScript language and for PDF" url="https://ghostscript.com/" arch="all" @@ -17,9 +17,14 @@ source="https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/ ghostscript-system-zlib.patch fix-sprintf.patch CVE-2019-10216.patch + forceput-inaccessible.patch " # secfixes: +# 9.27-r3: +# - CVE-2019-14811 +# - CVE-2019-14812 +# - CVE-2019-14813 # 9.27-r2: # - CVE-2019-10216 # 9.26-r2: @@ -130,4 +135,5 @@ sha512sums="9ad7bd24b6d9b7d258e943783817be036a2e0234517baffa1016804ef9b6f3062fb5 289d916a0b0da410e6f721e42bc44659c91c66ca0f7b96b1a6b010ae1c25e47788e282edc3578b4e4b120a2c684c7b1fd4cc574084bdc9cbbf6e431a01fbae0e 0001-Bug700317-Address-.force-operators-exposure.tgz 70721e3a335afa5e21d4e6cf919119010bd4544a03ab8f53f5325c173902221ad9b88c118b4bfeee80b3e1956bcdbaf4c53f64ae7fb81f5ba57dbc956750c482 ghostscript-system-zlib.patch beefcf395f7f828e1b81c088022c08a506e218f27535b9de01e0f0edf7979b435316c318fa676771630f6ad16ff1ab059cd68aa128ed97e5a9f2f3fa840200c4 fix-sprintf.patch -f89744b17922b7d9c04c6de69ce35fa621732e4373eccc158b7ff6a9e56d2cf0bbea30c28119f4808864ca584e94342e5125d7bcc6195252455b5f223f379e3f CVE-2019-10216.patch" +f89744b17922b7d9c04c6de69ce35fa621732e4373eccc158b7ff6a9e56d2cf0bbea30c28119f4808864ca584e94342e5125d7bcc6195252455b5f223f379e3f CVE-2019-10216.patch +d7045aa5a02a3fc882552da0b9a60ea565a36d5d038cdf576dc7188158dc05a470ce9fa40bdf1e1003a48995f6707431980910372da549918caf789eb3a2f81f forceput-inaccessible.patch" |