Blame SOURCES/ghostscript-9.23-100-run-dvipdf-securely.patch

a60c09
From 91c9c6d17d445781ee572c281b8b9d75d96f9df8 Mon Sep 17 00:00:00 2001
a60c09
From: "David Kaspar [Dee'Kej]" <dkaspar@redhat.com>
a60c09
Date: Fri, 7 Oct 2016 13:57:01 +0200
a60c09
Subject: [PATCH] Make sure 'dvipdf' is being run securely
a60c09
a60c09
---
a60c09
 lib/dvipdf | 2 +-
a60c09
 1 file changed, 1 insertion(+), 1 deletion(-)
a60c09
a60c09
diff --git a/lib/dvipdf b/lib/dvipdf
a60c09
index 802aeab..c92dfb0 100755
a60c09
--- a/lib/dvipdf
a60c09
+++ b/lib/dvipdf
a60c09
@@ -43,4 +43,4 @@ fi
a60c09
 
a60c09
 # We have to include the options twice because -I only takes effect if it
a60c09
 # appears before other options.
a60c09
-exec dvips -Ppdf $DVIPSOPTIONS -q -f "$infile" | $GS_EXECUTABLE $OPTIONS -q -P- -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite -sstdout=%stderr -sOutputFile="$outfile" $OPTIONS -c .setpdfwrite -
a60c09
+exec dvips -R -Ppdf $DVIPSOPTIONS -q -f "$infile" | $GS_EXECUTABLE $OPTIONS -q -P- -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite -sstdout=%stderr -sOutputFile="$outfile" $OPTIONS -c .setpdfwrite -
a60c09
-- 
a60c09
2.14.3
a60c09