summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorVladimír Čunát <v@cunat.cz>2019-06-22 11:53:12 +0200
committerVladimír Čunát <v@cunat.cz>2019-06-22 11:58:21 +0200
commit4fd6cb7abdac13dcb70651dabc33c03f5bc9b16e (patch)
treee9460edea4d6712915fb650026cd1b36f408c354 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parentffd9bf7e2929ec94ee3f8f3ec7b0d889eec302b4 (diff)
bzip2: patch CVE-2019-12900
The vulnerability seems quite serious. It isn't practical to use fetchpatch here due to bootstrapping, so I just committed the small patch file.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions