summaryrefslogtreecommitdiffstats
path: root/recompress.sh
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2019-04-02 20:30:22 +0000
committer Eric Hameleers <alien@slackware.com>2019-04-03 08:59:45 +0200
commitcaa5f28b83340fe23012ab27244a288449b26b26 (patch)
tree70102860b8f3df20347f25125b7ea065340cd1d5 /recompress.sh
parentdf86158dc598141c63689a86c2f247053e616719 (diff)
downloadcurrent-caa5f28b83340fe23012ab27244a288449b26b26.tar.gz
current-caa5f28b83340fe23012ab27244a288449b26b26.tar.xz
Tue Apr 2 20:30:22 UTC 201920190402203022
a/hwdata-0.322-noarch-1.txz: Upgraded. a/kernel-firmware-20190402_67b7579-noarch-1.txz: Upgraded. a/shadow-4.6-x86_64-2.txz: Rebuilt. adduser: reprompt on invalid user input. Thanks to ttk. ap/ghostscript-9.26-x86_64-2.txz: Rebuilt. Fixes security issues: A specially crafted PostScript file could have access to the file system outside of the constrains imposed by -dSAFER. Transient procedures can allow access to system operators, leading to remote code execution. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116 (* Security fix *) d/vala-0.44.2-x86_64-1.txz: Upgraded. l/glib-networking-2.60.1-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_36-x86_64-1.txz: Upgraded. l/python-pillow-6.0.0-x86_64-1.txz: Upgraded. n/wget-1.20.2-x86_64-1.txz: Upgraded. Fixed an unspecified buffer overflow vulnerability. (* Security fix *)
Diffstat (limited to 'recompress.sh')
-rwxr-xr-xrecompress.sh4
1 files changed, 4 insertions, 0 deletions
diff --git a/recompress.sh b/recompress.sh
index f95a743fb..048f2e1ff 100755
--- a/recompress.sh
+++ b/recompress.sh
@@ -704,6 +704,10 @@ gzip ./source/ap/seejpeg/seejpeg-1.10.diff
gzip ./source/ap/cups/doinst.sh
gzip ./source/ap/at/doinst.sh
gzip ./source/ap/ghostscript/cidfmap
+gzip ./source/ap/ghostscript/ghostscript-cve-2019-3835.patch
+gzip ./source/ap/ghostscript/ghostscript-cve-2019-6116.patch
+gzip ./source/ap/ghostscript/ghostscript-subclassing-devices-fix-put_image-method.patch
+gzip ./source/ap/ghostscript/ghostscript-cve-2019-3838.patch
gzip ./source/ap/screen/52fix_screen_utf8_nfd.patch
gzip ./source/ap/screen/60-revert-screenrc-change.diff
gzip ./source/ap/screen/26source_encoding.patch