[OE-core] [PATCH] ghostscript: CVE-2019-14869
Ross Burton
ross.burton at intel.com
Fri Nov 22 01:07:49 UTC 2019
On 21/11/2019 15:28, Stefan Ghinea wrote:
> file://CVE-2019-14811-0001.patch \
> file://CVE-2019-14817-0001.patch \
> file://CVE-2019-14817-0002.patch \
> + file://CVE-2019-14869-0001.patch \
> +
> "
Parsing recipes...ERROR: ParseError at
/home/pokybuild/yocto-worker/qemux86-64/build/meta/recipes-extended/ghostscript/ghostscript_9.27.bb:32:
unparsed line: 'SRC_URI_BASE =
"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs927/${BPN}-${PV}.tar.gz
file://ghostscript-9.15-parallel-make.patch
file://ghostscript-9.16-Werror-return-type.patch
file://do-not-check-local-libpng-source.patch
file://avoid-host-contamination.patch
file://mkdir-p.patch file://CVE-2019-14811-0001.patch
file://CVE-2019-14817-0001.patch
file://CVE-2019-14817-0002.patch
file://CVE-2019-14869-0001.patch '
Please remember to test your patches.
Ross
More information about the Openembedded-core
mailing list