slackware-current/source/a/zoo/zoo.SlackBuild

99 lines
3.2 KiB
Text
Raw Normal View History

#!/bin/bash
Tue Jan 16 20:49:28 UTC 2024 a/attr-2.5.2-x86_64-1.txz: Upgraded. a/shadow-4.14.3-x86_64-1.txz: Upgraded. a/zoo-2.10_28-x86_64-1.txz: Upgraded. Merge final patches from Debian to fix various bugs. Thanks to jayjwa. ap/sqlite-3.45.0-x86_64-1.txz: Upgraded. l/iso-codes-4.16.0-noarch-1.txz: Upgraded. n/gnutls-3.8.3-x86_64-1.txz: Upgraded. This update fixes two medium severity security issues: Fix more timing side-channel inside RSA-PSK key exchange. Fix assertion failure when verifying a certificate chain with a cycle of cross signatures. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-0553 https://www.cve.org/CVERecord?id=CVE-2024-0567 (* Security fix *) x/xorg-server-21.1.11-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) x/xorg-server-xephyr-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-23.2.4-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) xfce/xfce4-whiskermenu-plugin-2.8.3-x86_64-1.txz: Upgraded.
2024-01-16 21:49:28 +01:00
# Copyright 2008, 2009, 2010, 2018, 2024 Patrick J. Volkerding, Sebeka, Minnesota, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=zoo
VERSION=2.10
Tue Jan 16 20:49:28 UTC 2024 a/attr-2.5.2-x86_64-1.txz: Upgraded. a/shadow-4.14.3-x86_64-1.txz: Upgraded. a/zoo-2.10_28-x86_64-1.txz: Upgraded. Merge final patches from Debian to fix various bugs. Thanks to jayjwa. ap/sqlite-3.45.0-x86_64-1.txz: Upgraded. l/iso-codes-4.16.0-noarch-1.txz: Upgraded. n/gnutls-3.8.3-x86_64-1.txz: Upgraded. This update fixes two medium severity security issues: Fix more timing side-channel inside RSA-PSK key exchange. Fix assertion failure when verifying a certificate chain with a cycle of cross signatures. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-0553 https://www.cve.org/CVERecord?id=CVE-2024-0567 (* Security fix *) x/xorg-server-21.1.11-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) x/xorg-server-xephyr-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-23.2.4-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) xfce/xfce4-whiskermenu-plugin-2.8.3-x86_64-1.txz: Upgraded.
2024-01-16 21:49:28 +01:00
DEBPATCH=28
BUILD=${BUILD:-1}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) export ARCH=i586 ;;
arm*) export ARCH=arm ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) export ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-${VERSION}_${DEBPATCH}-$ARCH-$BUILD.txz"
exit 0
fi
TMP=${TMP:-/tmp}
PKG=$TMP/package-zoo
rm -rf $PKG
mkdir -p $TMP $PKG
cd $TMP
rm -rf zoo-$VERSION
Tue Jan 16 20:49:28 UTC 2024 a/attr-2.5.2-x86_64-1.txz: Upgraded. a/shadow-4.14.3-x86_64-1.txz: Upgraded. a/zoo-2.10_28-x86_64-1.txz: Upgraded. Merge final patches from Debian to fix various bugs. Thanks to jayjwa. ap/sqlite-3.45.0-x86_64-1.txz: Upgraded. l/iso-codes-4.16.0-noarch-1.txz: Upgraded. n/gnutls-3.8.3-x86_64-1.txz: Upgraded. This update fixes two medium severity security issues: Fix more timing side-channel inside RSA-PSK key exchange. Fix assertion failure when verifying a certificate chain with a cycle of cross signatures. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-0553 https://www.cve.org/CVERecord?id=CVE-2024-0567 (* Security fix *) x/xorg-server-21.1.11-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) x/xorg-server-xephyr-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-23.2.4-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) xfce/xfce4-whiskermenu-plugin-2.8.3-x86_64-1.txz: Upgraded.
2024-01-16 21:49:28 +01:00
tar xvf $CWD/zoo-$VERSION.tar.?z
cd zoo-$VERSION
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
Tue Jan 16 20:49:28 UTC 2024 a/attr-2.5.2-x86_64-1.txz: Upgraded. a/shadow-4.14.3-x86_64-1.txz: Upgraded. a/zoo-2.10_28-x86_64-1.txz: Upgraded. Merge final patches from Debian to fix various bugs. Thanks to jayjwa. ap/sqlite-3.45.0-x86_64-1.txz: Upgraded. l/iso-codes-4.16.0-noarch-1.txz: Upgraded. n/gnutls-3.8.3-x86_64-1.txz: Upgraded. This update fixes two medium severity security issues: Fix more timing side-channel inside RSA-PSK key exchange. Fix assertion failure when verifying a certificate chain with a cycle of cross signatures. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-0553 https://www.cve.org/CVERecord?id=CVE-2024-0567 (* Security fix *) x/xorg-server-21.1.11-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) x/xorg-server-xephyr-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.11-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-23.2.4-x86_64-1.txz: Upgraded. This update fixes security issues: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer. Reattaching to different master device may lead to out-of-bounds memory access. Heap buffer overflow in XISendDeviceHierarchyEvent. Heap buffer overflow in DisableDevice. SELinux context corruption. SELinux unlabeled GLX PBuffer. For more information, see: https://lists.x.org/archives/xorg/2024-January/061525.html https://www.cve.org/CVERecord?id=CVE-2023-6816 https://www.cve.org/CVERecord?id=CVE-2024-0229 https://www.cve.org/CVERecord?id=CVE-2024-21885 https://www.cve.org/CVERecord?id=CVE-2024-21886 https://www.cve.org/CVERecord?id=CVE-2024-0408 https://www.cve.org/CVERecord?id=CVE-2024-0409 (* Security fix *) xfce/xfce4-whiskermenu-plugin-2.8.3-x86_64-1.txz: Upgraded.
2024-01-16 21:49:28 +01:00
tar xf $CWD/zoo_${VERSION}-${DEBPATCH}.debian.tar.?z
for diff in debian/patches/*patch ; do
cat $diff | patch -p1 --verbose --backup --suffix=.orig || exit 1
done
zcat $CWD/zoo.gcc14.diff.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1
make linux || exit 1
mkdir -p $PKG/usr/bin
cat fiz > $PKG/usr/bin/fiz
cat zoo > $PKG/usr/bin/zoo
chmod 755 $PKG/usr/bin/*
mkdir -p $PKG/usr/man/man1
for page in fiz.1 zoo.1 ; do
cat $page | gzip -9c > $PKG/usr/man/man1/$page.gz
done
mkdir -p $PKG/usr/doc/zoo-${VERSION}
cp -a \
Copyright Install \
$PKG/usr/doc/zoo-${VERSION}
# Strip everything for good measure:
( cd $PKG
find . | xargs file | grep "executable" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
find . | xargs file | grep "shared object" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
)
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
# Build the package:
cd $PKG
makepkg -l y -c n $TMP/zoo-${VERSION}_${DEBPATCH}-$ARCH-$BUILD.txz