Changeset f429481
- Timestamp:
- 09/10/2021 09:47:52 PM (19 months ago)
- Branches:
- 11.1, 11.2, 11.3, ken/inkscape-core-mods, lazarus, plabs/python-mods, qt5new, trunk, upgradedb, xry111/intltool, xry111/soup3, xry111/test-20220226
- Children:
- 8d3c348
- Parents:
- eb448ba
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
introduction/welcome/changelog.xml
reb448ba rf429481 45 45 <para>September 10th, 2021</para> 46 46 <itemizedlist> 47 <listitem> 48 <para>[ken] - Patch ghostscript for CVE-2021-3781 0-day 49 (security update re libgs). Thanks to Doug for helping me 50 understand the public PoC. Fixes 51 <ulink url="&blfs-ticket-root;15517">#15517</ulink>.</para> 52 </listitem> 47 53 <listitem> 48 54 <para>[renodr] - Update to libseccomp-2.5.2. Fixes -
pst/printing/gs.xml
reb448ba rf429481 91 91 <para> 92 92 Required patch: 93 <ulink url="&patch-root;/ghostscript-&gs-version;-upstream_fix- 1.patch"/>93 <ulink url="&patch-root;/ghostscript-&gs-version;-upstream_fix-2.patch"/> 94 94 </para> 95 95 </listitem> … … 200 200 201 201 <para> 202 Apply a patch to prevent a segfault when processing some PDF files: 203 </para> 204 205 <screen><userinput remap="pre">patch -Np1 -i ../ghostscript-&gs-version;-upstream_fix-1.patch</userinput></screen> 202 Apply a patch to prevent a segfault when processing some PDF files and 203 to fix a public 0-day in libgs which can be exploited via ImageMagick: 204 </para> 205 206 <screen><userinput remap="pre">patch -Np1 -i ../ghostscript-&gs-version;-upstream_fix-2.patch</userinput></screen> 206 207 207 208 <para>
Note:
See TracChangeset
for help on using the changeset viewer.