source: trunk/server/fedora/specs/ghostscript.spec.patch @ 1684

Last change on this file since 1684 was 1587, checked in by geofft, 14 years ago
Patch Ghostscript overflow error, see GS bug #691295 (CVE-2010-1628)
File size: 1.4 KB
RevLine 
[1587]1--- ghostscript.spec    2010-07-16 01:35:28.000000000 -0400
2+++ ghostscript.spec    2010-07-16 01:55:49.000000000 -0400
3@@ -5,7 +5,7 @@
4 Name: ghostscript
5 Version: %{gs_ver}
6 
7-Release: 6%{?dist}
8+Release: 6.scripts%{scriptsversion}%{?dist}
9 
10 # Included CMap data is Redistributable, no modification permitted,
11 # see http://bugzilla.redhat.com/487510
12@@ -35,6 +35,8 @@
13 Patch17: ghostscript-tiff-default-strip-size.patch
14 Patch18: ghostscript-tiff-fixes.patch
15 
16+Patch100: ghostscript-CVE-2010-1628.patch
17+
18 Requires: urw-fonts >= 1.1, ghostscript-fonts
19 BuildRequires: xz
20 BuildRequires: libjpeg-devel, libXt-devel
21@@ -151,6 +153,9 @@
22 # Backported some more TIFF fixes (bug #573970).
23 %patch18 -p1 -b .tiff-fixes
24 
25+# Avoid an exploitable overflow (scripts.mit.edu local patch).
26+%patch100 -p1 -b .CVE-2010-1628
27+
28 # Convert manual pages to UTF-8
29 from8859_1() {
30        iconv -f iso-8859-1 -t utf-8 < "$1" > "${1}_"
31@@ -332,6 +337,13 @@
32 %{_libdir}/libgs.so
33 
34 %changelog
35+* Fri Jul 16 2010 Geoffrey Thomas <geofft@mit.edu> 8.71-6.scripts
36+- Include the patch
37+  http://bugs.ghostscript.com/attachment.cgi?id=6350
38+  to fix CVE-2010-1628 (potential arbitrary code execution via
39+  an overflow), from the upstream bug report:
40+  http://bugs.ghostscript.com/show_bug.cgi?id=691295
41+
42 * Tue Mar 16 2010 Tim Waugh <twaugh@redhat.com> 8.71-6
43 - Backported some more TIFF fixes (bug #573970).
44 - Use upstream fix for TIFF default strip size (bug #571520).
Note: See TracBrowser for help on using the repository browser.