diff --git a/ghostscript-9.23-100-run-dvipdf-securely.patch b/ghostscript-9.23-100-run-dvipdf-securely.patch deleted file mode 100644 index 80b0b7daf0b3c753121ef6d0d380d992181464e2..0000000000000000000000000000000000000000 --- a/ghostscript-9.23-100-run-dvipdf-securely.patch +++ /dev/null @@ -1,22 +0,0 @@ -From 91c9c6d17d445781ee572c281b8b9d75d96f9df8 Mon Sep 17 00:00:00 2001 -From: "David Kaspar [Dee'Kej]" -Date: Fri, 7 Oct 2016 13:57:01 +0200 -Subject: [PATCH] Make sure 'dvipdf' is being run securely - ---- - lib/dvipdf | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/lib/dvipdf b/lib/dvipdf -index 802aeab..c92dfb0 100755 ---- a/lib/dvipdf -+++ b/lib/dvipdf -@@ -43,4 +43,4 @@ fi - - # We have to include the options twice because -I only takes effect if it - # appears before other options. --exec dvips -Ppdf $DVIPSOPTIONS -q -f "$infile" | $GS_EXECUTABLE $OPTIONS -q -P- -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite -sstdout=%stderr -sOutputFile="$outfile" $OPTIONS -c .setpdfwrite - -+exec dvips -R -Ppdf $DVIPSOPTIONS -q -f "$infile" | $GS_EXECUTABLE $OPTIONS -q -P- -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite -sstdout=%stderr -sOutputFile="$outfile" $OPTIONS -c .setpdfwrite - --- -2.14.3 - diff --git a/ghostscript.spec b/ghostscript.spec index 8823471ffcee066215314509623fdafbbf9507e1..1d4ea4810e53c7c0c53ddb30b23f2be9e7783dde 100644 --- a/ghostscript.spec +++ b/ghostscript.spec @@ -9,15 +9,12 @@ Name: ghostscript Version: 9.27 -Release: 4 +Release: 5 Summary: An interpreter for PostScript and PDF files License: AGPLv3+ URL: https://ghostscript.com/ Source0: https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs%{version_short}/ghostscript-%{version}.tar.xz -# Downstream patches -Patch100: ghostscript-9.23-100-run-dvipdf-securely.patch - # Patch6000 from http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19 Patch6000: CVE-2019-10216.patch Patch6001: CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch @@ -182,6 +179,12 @@ make check %{_bindir}/dvipdf %changelog +* Tue Jan 7 2020 chengquan - 9.27-5 +- Type:CVE +- ID:NA +- SUG:NA +- DESC:remove useless patch + * Fri Jan 3 2020 wangxiao - 9.27-4 - Type:CVE - ID:NA