slackware-current/source/ap/ghostscript
Patrick J Volkerding caa5f28b83 Tue Apr 2 20:30:22 UTC 2019
a/hwdata-0.322-noarch-1.txz:  Upgraded.
a/kernel-firmware-20190402_67b7579-noarch-1.txz:  Upgraded.
a/shadow-4.6-x86_64-2.txz:  Rebuilt.
  adduser: reprompt on invalid user input. Thanks to ttk.
ap/ghostscript-9.26-x86_64-2.txz:  Rebuilt.
  Fixes security issues:
  A specially crafted PostScript file could have access to the file system
  outside of the constrains imposed by -dSAFER.
  Transient procedures can allow access to system operators, leading to
  remote code execution.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116
  (* Security fix *)
d/vala-0.44.2-x86_64-1.txz:  Upgraded.
l/glib-networking-2.60.1-x86_64-1.txz:  Upgraded.
l/imagemagick-6.9.10_36-x86_64-1.txz:  Upgraded.
l/python-pillow-6.0.0-x86_64-1.txz:  Upgraded.
n/wget-1.20.2-x86_64-1.txz:  Upgraded.
  Fixed an unspecified buffer overflow vulnerability.
  (* Security fix *)
2019-04-03 08:59:45 +02:00
..
cidfmap Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
dump.unused.internal.libraries.from.sources.sh Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
ghostscript-cve-2019-3835.patch Tue Apr 2 20:30:22 UTC 2019 2019-04-03 08:59:45 +02:00
ghostscript-cve-2019-3838.patch Tue Apr 2 20:30:22 UTC 2019 2019-04-03 08:59:45 +02:00
ghostscript-cve-2019-6116.patch Tue Apr 2 20:30:22 UTC 2019 2019-04-03 08:59:45 +02:00
ghostscript-subclassing-devices-fix-put_image-method.patch Tue Apr 2 20:30:22 UTC 2019 2019-04-03 08:59:45 +02:00
ghostscript.SlackBuild Tue Apr 2 20:30:22 UTC 2019 2019-04-03 08:59:45 +02:00
ghostscript.url Thu Nov 22 05:56:56 UTC 2018 2018-11-22 17:59:46 +01:00
ijs-config Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
slack-desc Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00