diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2018-10-07 11:21:48 +0100 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2018-10-07 11:21:48 +0100 |
commit | a50ad61e4e1adda3dca7d9e3956f7b8a33f29da8 (patch) | |
tree | fa48c910503269eafc750c47740a6ccc93f10ad7 /app-text/ghostscript-gpl/files/VU332928-githasha054156d.patch | |
parent | 4cd19467e056b0359d9819617faab1e796a351e6 (diff) |
dev-libs/botan : gentoo fixed their mess, so drop this
Diffstat (limited to 'app-text/ghostscript-gpl/files/VU332928-githasha054156d.patch')
-rw-r--r-- | app-text/ghostscript-gpl/files/VU332928-githasha054156d.patch | 52 |
1 files changed, 0 insertions, 52 deletions
diff --git a/app-text/ghostscript-gpl/files/VU332928-githasha054156d.patch b/app-text/ghostscript-gpl/files/VU332928-githasha054156d.patch deleted file mode 100644 index 08079b31..00000000 --- a/app-text/ghostscript-gpl/files/VU332928-githasha054156d.patch +++ /dev/null @@ -1,52 +0,0 @@ -From: Chris Liddell <chris.liddell@artifex.com> -Date: Tue, 21 Aug 2018 19:17:51 +0000 (+0100) -Subject: Bug 699658: Fix handling of pre-SAFER opened files. -X-Git-Tag: ghostpdl-9.24rc1~21 -X-Git-Url: http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff_plain;h=a054156d - -Bug 699658: Fix handling of pre-SAFER opened files. - -Temp files opened for writing before SAFER is engaged are not subject to the -SAFER restrictions - that is handled by recording in a dictionary, and -checking that as part of the permissions checks. - -By adding a custom error handler for invalidaccess, that allowed the filename -to be added to the dictionary (despite the attempted open throwing the error) -thus meaning subsequent accesses were erroneously permitted. ---- - -diff --git a/Resource/Init/gs_init.ps b/Resource/Init/gs_init.ps -index a6e49f0..5a5a428 100644 ---- a/Resource/Init/gs_init.ps -+++ b/Resource/Init/gs_init.ps -@@ -2036,6 +2036,19 @@ readonly def - concatstrings concatstrings .generate_dir_list_templates - } if - ] -+ /PermitFileWriting [ -+ currentuserparams /PermitFileWriting get aload pop -+ (TMPDIR) getenv not -+ { -+ (TEMP) getenv not -+ { -+ (TMP) getenv not -+ { -+ (/temp) (/tmp) -+ } if -+ } if -+ } if -+ ] - /LockFilePermissions //true - >> setuserparams - } -@@ -2122,7 +2135,9 @@ readonly def - % the file can be deleted later, even if SAFER is set. - /.tempfile { - .tempfile % filename file -- //SAFETY /tempfiles get 2 .argindex //true .forceput -+ //SAFETY /safe get not { % only add the filename if we're not yet safe -+ //SAFETY /tempfiles get 2 .argindex //true .forceput -+ } if - } .bind executeonly odef - - % If we are running in SAFER mode, lock things down |