remove useless patch
This commit is contained in:
parent
923f56f7d3
commit
dfee7ae3ef
@ -1,22 +0,0 @@
|
|||||||
From 91c9c6d17d445781ee572c281b8b9d75d96f9df8 Mon Sep 17 00:00:00 2001
|
|
||||||
From: "David Kaspar [Dee'Kej]" <dkaspar@redhat.com>
|
|
||||||
Date: Fri, 7 Oct 2016 13:57:01 +0200
|
|
||||||
Subject: [PATCH] Make sure 'dvipdf' is being run securely
|
|
||||||
|
|
||||||
---
|
|
||||||
lib/dvipdf | 2 +-
|
|
||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/lib/dvipdf b/lib/dvipdf
|
|
||||||
index 802aeab..c92dfb0 100755
|
|
||||||
--- a/lib/dvipdf
|
|
||||||
+++ b/lib/dvipdf
|
|
||||||
@@ -43,4 +43,4 @@ fi
|
|
||||||
|
|
||||||
# We have to include the options twice because -I only takes effect if it
|
|
||||||
# appears before other options.
|
|
||||||
-exec dvips -Ppdf $DVIPSOPTIONS -q -f "$infile" | $GS_EXECUTABLE $OPTIONS -q -P- -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite -sstdout=%stderr -sOutputFile="$outfile" $OPTIONS -c .setpdfwrite -
|
|
||||||
+exec dvips -R -Ppdf $DVIPSOPTIONS -q -f "$infile" | $GS_EXECUTABLE $OPTIONS -q -P- -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite -sstdout=%stderr -sOutputFile="$outfile" $OPTIONS -c .setpdfwrite -
|
|
||||||
--
|
|
||||||
2.14.3
|
|
||||||
|
|
||||||
@ -9,15 +9,12 @@
|
|||||||
|
|
||||||
Name: ghostscript
|
Name: ghostscript
|
||||||
Version: 9.27
|
Version: 9.27
|
||||||
Release: 4
|
Release: 5
|
||||||
Summary: An interpreter for PostScript and PDF files
|
Summary: An interpreter for PostScript and PDF files
|
||||||
License: AGPLv3+
|
License: AGPLv3+
|
||||||
URL: https://ghostscript.com/
|
URL: https://ghostscript.com/
|
||||||
Source0: https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs%{version_short}/ghostscript-%{version}.tar.xz
|
Source0: https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs%{version_short}/ghostscript-%{version}.tar.xz
|
||||||
|
|
||||||
# Downstream patches
|
|
||||||
Patch100: ghostscript-9.23-100-run-dvipdf-securely.patch
|
|
||||||
|
|
||||||
# Patch6000 from http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19
|
# Patch6000 from http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19
|
||||||
Patch6000: CVE-2019-10216.patch
|
Patch6000: CVE-2019-10216.patch
|
||||||
Patch6001: CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch
|
Patch6001: CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch
|
||||||
@ -182,6 +179,12 @@ make check
|
|||||||
%{_bindir}/dvipdf
|
%{_bindir}/dvipdf
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Jan 7 2020 chengquan<chengquan3@huawei.com> - 9.27-5
|
||||||
|
- Type:CVE
|
||||||
|
- ID:NA
|
||||||
|
- SUG:NA
|
||||||
|
- DESC:remove useless patch
|
||||||
|
|
||||||
* Fri Jan 3 2020 wangxiao<wangxiao65@huawei.com> - 9.27-4
|
* Fri Jan 3 2020 wangxiao<wangxiao65@huawei.com> - 9.27-4
|
||||||
- Type:CVE
|
- Type:CVE
|
||||||
- ID:NA
|
- ID:NA
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user