Ignore:
Timestamp:
09/10/2021 09:47:52 PM (19 months ago)
Author:
Ken Moffat <ken@…>
Branches:
11.1, 11.2, 11.3, ken/inkscape-core-mods, lazarus, plabs/python-mods, qt5new, trunk, upgradedb, xry111/intltool, xry111/soup3, xry111/test-20220226
Children:
8d3c348
Parents:
eb448ba
Message:

ghostscript - patch it to fix CVE-2021-3781.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • pst/printing/gs.xml

    reb448ba rf429481  
    9191        <para>
    9292          Required patch:
    93           <ulink url="&patch-root;/ghostscript-&gs-version;-upstream_fix-1.patch"/>
     93          <ulink url="&patch-root;/ghostscript-&gs-version;-upstream_fix-2.patch"/>
    9494        </para>
    9595      </listitem>
     
    200200
    201201    <para>
    202       Apply a patch to prevent a segfault when processing some PDF files:
    203     </para>
    204 
    205 <screen><userinput remap="pre">patch -Np1 -i ../ghostscript-&gs-version;-upstream_fix-1.patch</userinput></screen>
     202      Apply a patch to prevent a segfault when processing some PDF files and
     203      to fix a public 0-day in libgs which can be exploited via ImageMagick:
     204    </para>
     205
     206<screen><userinput remap="pre">patch -Np1 -i ../ghostscript-&gs-version;-upstream_fix-2.patch</userinput></screen>
    206207
    207208    <para>
Note: See TracChangeset for help on using the changeset viewer.