[OE-core] [PATCH] ghostscript: CVE-2019-14869

Ross Burton ross.burton at intel.com
Fri Nov 22 01:07:49 UTC 2019


On 21/11/2019 15:28, Stefan Ghinea wrote:
>                   file://CVE-2019-14811-0001.patch \
>                   file://CVE-2019-14817-0001.patch \
>                   file://CVE-2019-14817-0002.patch \
> +                file://CVE-2019-14869-0001.patch \
> +
>   "


Parsing recipes...ERROR: ParseError at 
/home/pokybuild/yocto-worker/qemux86-64/build/meta/recipes-extended/ghostscript/ghostscript_9.27.bb:32: 
unparsed line: 'SRC_URI_BASE = 
"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs927/${BPN}-${PV}.tar.gz 
                 file://ghostscript-9.15-parallel-make.patch 
     file://ghostscript-9.16-Werror-return-type.patch 
file://do-not-check-local-libpng-source.patch 
file://avoid-host-contamination.patch 
file://mkdir-p.patch                 file://CVE-2019-14811-0001.patch 
              file://CVE-2019-14817-0001.patch 
file://CVE-2019-14817-0002.patch 
file://CVE-2019-14869-0001.patch '

Please remember to test your patches.

Ross


More information about the Openembedded-core mailing list