diff options
Diffstat (limited to 'meta/recipes-extended/ghostscript/ghostscript_9.52.bb')
-rw-r--r-- | meta/recipes-extended/ghostscript/ghostscript_9.52.bb | 18 |
1 files changed, 17 insertions, 1 deletions
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.52.bb b/meta/recipes-extended/ghostscript/ghostscript_9.52.bb index 65135f5821..e57f592892 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.52.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.52.bb | |||
@@ -19,6 +19,10 @@ DEPENDS_class-native = "libpng-native" | |||
19 | UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" | 19 | UPSTREAM_CHECK_URI = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases" |
20 | UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" | 20 | UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" |
21 | 21 | ||
22 | # The jpeg issue in the CVE is present in the gs jpeg sources | ||
23 | # however we use an external jpeg which doesn't have the issue. | ||
24 | CVE_CHECK_WHITELIST += "CVE-2013-6629" | ||
25 | |||
22 | def gs_verdir(v): | 26 | def gs_verdir(v): |
23 | return "".join(v.split(".")) | 27 | return "".join(v.split(".")) |
24 | 28 | ||
@@ -29,12 +33,24 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d | |||
29 | file://do-not-check-local-libpng-source.patch \ | 33 | file://do-not-check-local-libpng-source.patch \ |
30 | file://avoid-host-contamination.patch \ | 34 | file://avoid-host-contamination.patch \ |
31 | file://mkdir-p.patch \ | 35 | file://mkdir-p.patch \ |
36 | file://CVE-2020-15900.patch \ | ||
37 | file://check-stack-limits-after-function-evalution.patch \ | ||
38 | file://CVE-2021-45949.patch \ | ||
39 | file://CVE-2021-3781_1.patch \ | ||
40 | file://CVE-2021-3781_2.patch \ | ||
41 | file://CVE-2021-3781_3.patch \ | ||
42 | file://CVE-2023-28879.patch \ | ||
43 | file://0001-Bug-706897-Copy-pcx-buffer-overrun-fix-from-devices-.patch \ | ||
44 | file://CVE-2023-36664-pre1.patch \ | ||
45 | file://CVE-2023-36664-1.patch \ | ||
46 | file://CVE-2023-36664-2.patch \ | ||
47 | file://CVE-2023-43115.patch \ | ||
48 | file://CVE-2020-36773.patch \ | ||
32 | " | 49 | " |
33 | 50 | ||
34 | SRC_URI = "${SRC_URI_BASE} \ | 51 | SRC_URI = "${SRC_URI_BASE} \ |
35 | file://ghostscript-9.21-prevent_recompiling.patch \ | 52 | file://ghostscript-9.21-prevent_recompiling.patch \ |
36 | file://cups-no-gcrypt.patch \ | 53 | file://cups-no-gcrypt.patch \ |
37 | file://CVE-2020-15900.patch \ | ||
38 | " | 54 | " |
39 | 55 | ||
40 | SRC_URI_class-native = "${SRC_URI_BASE} \ | 56 | SRC_URI_class-native = "${SRC_URI_BASE} \ |