aboutsummaryrefslogtreecommitdiffstats
path: root/main/ghostscript/APKBUILD
diff options
context:
space:
mode:
authorJ0WI <J0WI@users.noreply.github.com>2019-08-29 23:21:40 +0200
committerNatanael Copa <ncopa@alpinelinux.org>2019-09-03 14:19:27 +0000
commit47e96eb4a65356706c4e6344e74859d045d38237 (patch)
tree7cfadb5a6f21454e2f919940be7dfa38d79595c6 /main/ghostscript/APKBUILD
parent21cda98b4088fa861bf13a87262666d54673e54f (diff)
downloadaports-47e96eb4a65356706c4e6344e74859d045d38237.tar.bz2
aports-47e96eb4a65356706c4e6344e74859d045d38237.tar.xz
main/ghostscript: add security patches
Diffstat (limited to 'main/ghostscript/APKBUILD')
-rw-r--r--main/ghostscript/APKBUILD10
1 files changed, 8 insertions, 2 deletions
diff --git a/main/ghostscript/APKBUILD b/main/ghostscript/APKBUILD
index 02999ebc1d..26b4e9fc19 100644
--- a/main/ghostscript/APKBUILD
+++ b/main/ghostscript/APKBUILD
@@ -2,7 +2,7 @@
# Maintainer: Cameron Banta <cbanta@gmail.com>
pkgname=ghostscript
pkgver=9.27
-pkgrel=2
+pkgrel=3
pkgdesc="An interpreter for the PostScript language and for PDF"
url="https://ghostscript.com/"
arch="all"
@@ -17,9 +17,14 @@ source="https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/
ghostscript-system-zlib.patch
fix-sprintf.patch
CVE-2019-10216.patch
+ forceput-inaccessible.patch
"
# secfixes:
+# 9.27-r3:
+# - CVE-2019-14811
+# - CVE-2019-14812
+# - CVE-2019-14813
# 9.27-r2:
# - CVE-2019-10216
# 9.26-r2:
@@ -130,4 +135,5 @@ sha512sums="9ad7bd24b6d9b7d258e943783817be036a2e0234517baffa1016804ef9b6f3062fb5
289d916a0b0da410e6f721e42bc44659c91c66ca0f7b96b1a6b010ae1c25e47788e282edc3578b4e4b120a2c684c7b1fd4cc574084bdc9cbbf6e431a01fbae0e 0001-Bug700317-Address-.force-operators-exposure.tgz
70721e3a335afa5e21d4e6cf919119010bd4544a03ab8f53f5325c173902221ad9b88c118b4bfeee80b3e1956bcdbaf4c53f64ae7fb81f5ba57dbc956750c482 ghostscript-system-zlib.patch
beefcf395f7f828e1b81c088022c08a506e218f27535b9de01e0f0edf7979b435316c318fa676771630f6ad16ff1ab059cd68aa128ed97e5a9f2f3fa840200c4 fix-sprintf.patch
-f89744b17922b7d9c04c6de69ce35fa621732e4373eccc158b7ff6a9e56d2cf0bbea30c28119f4808864ca584e94342e5125d7bcc6195252455b5f223f379e3f CVE-2019-10216.patch"
+f89744b17922b7d9c04c6de69ce35fa621732e4373eccc158b7ff6a9e56d2cf0bbea30c28119f4808864ca584e94342e5125d7bcc6195252455b5f223f379e3f CVE-2019-10216.patch
+d7045aa5a02a3fc882552da0b9a60ea565a36d5d038cdf576dc7188158dc05a470ce9fa40bdf1e1003a48995f6707431980910372da549918caf789eb3a2f81f forceput-inaccessible.patch"