package/ghostscript: add upstream security fixes
authorBaruch Siach <baruch@tkos.co.il>
Tue, 12 Feb 2019 18:42:20 +0000 (20:42 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Tue, 12 Feb 2019 19:02:46 +0000 (20:02 +0100)
commit2e060d64e21a8f4dd8943acdbc3e1e563df13aba
treed4ae73dbc8a682b44da2caf775023a38403cb6bf
parent0526c9f7819722b2deebf7a15821689ac4ead56a
package/ghostscript: add upstream security fixes

CVE-2019-6116: Remote code execution.

https://www.openwall.com/lists/oss-security/2019/01/23/5

Cc: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/ghostscript/0002-Sanitize-op-stack-for-error-conditions.patch [new file with mode: 0644]
package/ghostscript/0003-Any-transient-procedures-that-call-.force-operators.patch [new file with mode: 0644]
package/ghostscript/0004-Bug700317-Fix-logic-for-an-older-change.patch [new file with mode: 0644]
package/ghostscript/0005-Harden-some-uses-of-.force-operators.patch [new file with mode: 0644]
package/ghostscript/0006-Undefine-a-bunch-of-gs_fonts.ps-specific-procs.patch [new file with mode: 0644]
package/ghostscript/0007-Remove-.forcedef-and-harden-.force-ops-more.patch [new file with mode: 0644]