slackware-current/source/l/poppler/poppler.SlackBuild

147 lines
4.4 KiB
Text
Raw Normal View History

#!/bin/bash
Tue Oct 3 22:19:10 UTC 2023 a/aaa_glibc-solibs-2.37-x86_64-3.txz: Rebuilt. a/dialog-1.3_20231002-x86_64-1.txz: Upgraded. ap/mpg123-1.32.3-x86_64-1.txz: Upgraded. d/llvm-17.0.2-x86_64-1.txz: Upgraded. d/meson-1.2.2-x86_64-2.txz: Rebuilt. [PATCH] Revert rust: apply global, project, and environment C args to bindgen. This fixes building Mesa. Thanks to lucabon and marav. kde/calligra-3.2.1-x86_64-34.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/cantor-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kfilemetadata-5.110.0-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kile-2.9.93-x86_64-28.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kitinerary-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/krita-5.1.5-x86_64-15.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/okular-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. l/glibc-2.37-x86_64-3.txz: Rebuilt. l/glibc-i18n-2.37-x86_64-3.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) l/glibc-profile-2.37-x86_64-3.txz: Rebuilt. l/mozilla-nss-3.94-x86_64-1.txz: Upgraded. l/poppler-23.10.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/NetworkManager-1.44.2-x86_64-1.txz: Upgraded. n/irssi-1.4.5-x86_64-1.txz: Upgraded. x/fcitx5-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-gtk-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-hangul-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-kkc-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-m17n-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-sayura-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-extra-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-other-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-unikey-5.1.1-x86_64-1.txz: Upgraded. x/libX11-1.8.7-x86_64-1.txz: Upgraded. This update fixes security issues: libX11: out-of-bounds memory access in _XkbReadKeySyms(). libX11: stack exhaustion from infinite recursion in PutSubImage(). libX11: integer overflow in XCreateImage() leading to a heap overflow. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43785 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://www.cve.org/CVERecord?id=CVE-2023-43787 (* Security fix *) x/libXpm-3.5.17-x86_64-1.txz: Upgraded. This update fixes security issues: libXpm: out of bounds read in XpmCreateXpmImageFromBuffer(). libXpm: out of bounds read on XPM with corrupted colormap. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43788 https://www.cve.org/CVERecord?id=CVE-2023-43789 (* Security fix *) testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-2.38-x86_64-2.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) testing/packages/glibc-i18n-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-profile-2.38-x86_64-2.txz: Rebuilt.
2023-10-04 00:19:10 +02:00
# Copyright 2006, 2007, 2008, 2009, 2010, 2012, 2017, 2018, 2020, 2023 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=poppler
Thu Nov 2 20:33:13 UTC 2023 a/gawk-5.3.0-x86_64-1.txz: Upgraded. a/kernel-firmware-20231030_2b304bf-noarch-1.txz: Upgraded. a/kernel-generic-6.1.61-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.61-x86_64-1.txz: Upgraded. -EXT2_FS_POSIX_ACL y -EXT2_FS_SECURITY y -EXT2_FS_XATTR y -EXT3_FS_POSIX_ACL y -EXT3_FS_SECURITY y EXT2_FS y -> n EXT3_FS y -> n NLS_ISO8859_15 m -> y SCSI_SMARTPQI m -> y +EXT4_USE_FOR_EXT2 y a/kernel-modules-6.1.61-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.61-x86-1.txz: Upgraded. k/kernel-source-6.1.61-noarch-1.txz: Upgraded. -EXT2_FS_POSIX_ACL y -EXT2_FS_SECURITY y -EXT2_FS_XATTR y -EXT3_FS_POSIX_ACL y -EXT3_FS_SECURITY y EXT2_FS y -> n EXT3_FS y -> n NLS_ISO8859_1 m -> y NLS_ISO8859_15 m -> y NLS_UTF8 m -> y SCSI_VIRTIO m -> y +EXT4_USE_FOR_EXT2 y kde/calligra-3.2.1-x86_64-35.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/cantor-23.08.2-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/fcitx5-configtool-5.1.2-x86_64-1.txz: Upgraded. kde/kfilemetadata-5.111.0-x86_64-3.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/kile-2.9.93-x86_64-29.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/kitinerary-23.08.2-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/krita-5.2.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/okular-23.08.2-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. l/pipewire-0.3.84-x86_64-1.txz: Upgraded. l/poppler-23.11.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/postfix-3.8.3-x86_64-1.txz: Upgraded. x/fcitx5-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-hangul-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-sayura-5.1.1-x86_64-1.txz: Upgraded. x/libime-1.1.3-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-11-02 21:33:13 +01:00
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
Wed Dec 6 05:03:11 UTC 2023 a/aaa_libraries-15.1-x86_64-23.txz: Rebuilt. Upgraded: libelf-0.190.so, libcares.so.2.9.0, libglib-2.0.so.0.7800.2, libgmodule-2.0.so.0.7800.2, libgobject-2.0.so.0.7800.2, libgthread-2.0.so.0.7800.2. Added: libtiff.so.6.0.2, libtiffxx.so.6.0.2. a/util-linux-2.39.3-x86_64-1.txz: Upgraded. ap/cups-filters-1.28.17-x86_64-3.txz: Rebuilt. Recompiled against libtiff-4.6.0. ap/ghostscript-10.02.1-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. ap/rpm-4.19.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. e/emacs-29.1-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. kde/bluedevil-5.27.10-x86_64-1.txz: Upgraded. kde/breeze-5.27.10-x86_64-1.txz: Upgraded. kde/breeze-grub-5.27.10-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.27.10-x86_64-1.txz: Upgraded. kde/digikam-8.2.0-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. kde/drkonqi-5.27.10-x86_64-1.txz: Upgraded. kde/gwenview-23.08.3-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. kde/kactivitymanagerd-5.27.10-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.27.10-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.27.10-x86_64-1.txz: Upgraded. kde/kdecoration-5.27.10-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.27.10-x86_64-1.txz: Upgraded. kde/kgamma5-5.27.10-x86_64-1.txz: Upgraded. kde/khotkeys-5.27.10-x86_64-1.txz: Upgraded. kde/kinfocenter-5.27.10-x86_64-1.txz: Upgraded. kde/kmenuedit-5.27.10-x86_64-1.txz: Upgraded. kde/kpipewire-5.27.10-x86_64-1.txz: Upgraded. kde/krita-5.2.1-x86_64-3.txz: Rebuilt. Recompiled against libtiff-4.6.0. kde/kscreen-5.27.10-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.27.10-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.27.10-x86_64-1.txz: Upgraded. kde/ksystemstats-5.27.10-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.27.10-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.27.10-x86_64-1.txz: Upgraded. kde/kwin-5.27.10-x86_64-1.txz: Upgraded. kde/kwrited-5.27.10-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.27.10-x86_64-1.txz: Upgraded. kde/libkscreen-5.27.10-x86_64-1.txz: Upgraded. kde/libksysguard-5.27.10-x86_64-1.txz: Upgraded. kde/milou-5.27.10-x86_64-1.txz: Upgraded. kde/okular-23.08.3-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. kde/oxygen-5.27.10-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-disks-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-integration-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-nm-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-pa-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-vault-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.27.10-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.27.10-noarch-1.txz: Upgraded. kde/polkit-kde-agent-1-5.27.10-x86_64-1.txz: Upgraded. kde/powerdevil-5.27.10-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.27.10-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.27.10-x86_64-1.txz: Upgraded. kde/systemsettings-5.27.10-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.27.10-x86_64-1.txz: Upgraded. l/SDL2_image-2.6.3-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/djvulibre-3.5.28-x86_64-4.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/gd-2.3.3-x86_64-3.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/gdk-pixbuf2-2.42.10-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/gegl-0.4.46-x86_64-3.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/glib2-2.78.2-x86_64-1.txz: Upgraded. l/gtk4-4.12.4-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/imagemagick-7.1.1_22-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/lcms-1.19-x86_64-7.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/lcms2-2.16-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/libtiff-4.6.0-x86_64-1.txz: Upgraded. Probably best to get this one out of the way... From the release announcement: Pay attention to the following warning: This version removes a big number of utilities that have suffered from lack of maintenance over the years and were the source of various reported security issues. See "Removed functionality" below for the list of removed utilities. Starting with libtiff v4.6.0, their source code, at this time, will still be available in the source distribution, but they will no longer be built by default, and issues related to them will no longer be accepted in the libtiff bug tracker. The only remaining supported TIFF tools are tiffinfo, tiffdump, tiffcp, tiffset and tiffsplit. Shared library .so-version bump. l/libwebp-1.3.2-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/netpbm-11.04.04-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/opencv-4.8.1-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/poppler-23.12.0-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/python-pillow-8.4.0-x86_64-3.txz: Rebuilt. Recompiled against libtiff-4.6.0. l/qt5-5.15.11_20231125_4765fa1d-x86_64-1.txz: Upgraded. Compiled against libtiff-4.6.0. l/sdl-1.2.15-x86_64-15.txz: Rebuilt. Recompiled against libtiff-4.6.0. n/links-2.29-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. t/xfig-3.2.9-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. xap/geeqie-2.1-x86_64-4.txz: Rebuilt. Recompiled against libtiff-4.6.0. xap/gimp-2.10.36-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. xap/sane-1.2.1-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. xap/windowmaker-0.96.0-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. xap/xpaint-3.1.4-x86_64-2.txz: Rebuilt. Recompiled against libtiff-4.6.0. xap/xsane-0.999-x86_64-6.txz: Rebuilt. Recompiled against libtiff-4.6.0.
2023-12-06 06:03:11 +01:00
BUILD=${BUILD:-2}
Tue Oct 3 22:19:10 UTC 2023 a/aaa_glibc-solibs-2.37-x86_64-3.txz: Rebuilt. a/dialog-1.3_20231002-x86_64-1.txz: Upgraded. ap/mpg123-1.32.3-x86_64-1.txz: Upgraded. d/llvm-17.0.2-x86_64-1.txz: Upgraded. d/meson-1.2.2-x86_64-2.txz: Rebuilt. [PATCH] Revert rust: apply global, project, and environment C args to bindgen. This fixes building Mesa. Thanks to lucabon and marav. kde/calligra-3.2.1-x86_64-34.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/cantor-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kfilemetadata-5.110.0-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kile-2.9.93-x86_64-28.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kitinerary-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/krita-5.1.5-x86_64-15.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/okular-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. l/glibc-2.37-x86_64-3.txz: Rebuilt. l/glibc-i18n-2.37-x86_64-3.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) l/glibc-profile-2.37-x86_64-3.txz: Rebuilt. l/mozilla-nss-3.94-x86_64-1.txz: Upgraded. l/poppler-23.10.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/NetworkManager-1.44.2-x86_64-1.txz: Upgraded. n/irssi-1.4.5-x86_64-1.txz: Upgraded. x/fcitx5-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-gtk-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-hangul-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-kkc-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-m17n-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-sayura-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-extra-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-other-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-unikey-5.1.1-x86_64-1.txz: Upgraded. x/libX11-1.8.7-x86_64-1.txz: Upgraded. This update fixes security issues: libX11: out-of-bounds memory access in _XkbReadKeySyms(). libX11: stack exhaustion from infinite recursion in PutSubImage(). libX11: integer overflow in XCreateImage() leading to a heap overflow. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43785 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://www.cve.org/CVERecord?id=CVE-2023-43787 (* Security fix *) x/libXpm-3.5.17-x86_64-1.txz: Upgraded. This update fixes security issues: libXpm: out of bounds read in XpmCreateXpmImageFromBuffer(). libXpm: out of bounds read on XPM with corrupted colormap. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43788 https://www.cve.org/CVERecord?id=CVE-2023-43789 (* Security fix *) testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-2.38-x86_64-2.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) testing/packages/glibc-i18n-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-profile-2.38-x86_64-2.txz: Rebuilt.
2023-10-04 00:19:10 +02:00
QT6OPT=${QT6OPT:--DENABLE_QT6=OFF}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) export ARCH=i586 ;;
arm*) export ARCH=arm ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) export ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
Fri Sep 21 18:51:07 UTC 2018 a/eudev-3.2.6-x86_64-1.txz: Upgraded. a/glibc-solibs-2.28-x86_64-2.txz: Upgraded. a/grub-2.02-x86_64-3.txz: Rebuilt. Patched to fix compatibility with recent xfsprogs. Thanks to Markus Wiesner. a/kernel-generic-4.14.71-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.71-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.71-x86_64-1.txz: Upgraded. ap/opus-tools-0.2-x86_64-1.txz: Upgraded. ap/sqlite-3.25.1-x86_64-1.txz: Upgraded. d/icecream-20180905_cdc6ff8-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.71-x86-1.txz: Upgraded. d/llvm-7.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.14.71-noarch-1.txz: Upgraded. l/ffmpeg-3.4.4-x86_64-2.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. l/glibc-2.28-x86_64-2.txz: Upgraded. All packages have been patched where needed for glibc-2.28 and compile tested here. Thanks to nobodino for the help. l/glibc-i18n-2.28-x86_64-2.txz: Upgraded. l/glibc-profile-2.28-x86_64-2.txz: Upgraded. l/gst-plugins-base-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.14.3-x86_64-1.txz: Upgraded. l/gstreamer-1.14.3-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_11-x86_64-1.txz: Upgraded. l/libopusenc-0.2-x86_64-1.txz: Added. l/librsvg-2.44.3-x86_64-1.txz: Upgraded. l/opus-1.3_rc2-x86_64-1.txz: Upgraded. l/opusfile-0.11-x86_64-1.txz: Upgraded. l/soprano-2.9.4-x86_64-3.txz: Rebuilt. Recompiled to drop virtuoso dependency. l/virtuoso-ose-6.1.8-x86_64-9.txz: Removed. Even KDE4 has migrated away from actually using this for anything. The last thing in Slackware that was dependent on it was Soprano, which has been recompiled to no longer use it. n/postfix-3.3.1-x86_64-2.txz: Rebuilt. Recompiled so that it quits whining about OpenSSL. Thanks to shastah. x/mesa-18.2.1-x86_64-1.txz: Upgraded. Compiled against llvm-7.0.0. x/xf86-video-vmware-13.3.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-7.0.0. x/xterm-336-x86_64-1.txz: Upgraded. extra/pure-alsa-system/ffmpeg-3.4.4-x86_64-2_alsa.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. extra/pure-alsa-system/gst-plugins-good-1.14.3-x86_64-1_alsa.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-09-21 20:51:07 +02:00
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
if [ "$ARCH" = "i586" ]; then
SLKCFLAGS="-O2 -march=i586 -mtune=i686"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "s390" ]; then
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
SLKCFLAGS="-O2 -fPIC"
LIBDIRSUFFIX="64"
else
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
fi
TMP=${TMP:-/tmp}
PKG=$TMP/package-${PKGNAM}
rm -rf $PKG
mkdir -p $TMP $PKG
cd $TMP || exit 1
rm -rf ${PKGNAM}-${VERSION}
Thu Nov 2 20:33:13 UTC 2023 a/gawk-5.3.0-x86_64-1.txz: Upgraded. a/kernel-firmware-20231030_2b304bf-noarch-1.txz: Upgraded. a/kernel-generic-6.1.61-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.61-x86_64-1.txz: Upgraded. -EXT2_FS_POSIX_ACL y -EXT2_FS_SECURITY y -EXT2_FS_XATTR y -EXT3_FS_POSIX_ACL y -EXT3_FS_SECURITY y EXT2_FS y -> n EXT3_FS y -> n NLS_ISO8859_15 m -> y SCSI_SMARTPQI m -> y +EXT4_USE_FOR_EXT2 y a/kernel-modules-6.1.61-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.61-x86-1.txz: Upgraded. k/kernel-source-6.1.61-noarch-1.txz: Upgraded. -EXT2_FS_POSIX_ACL y -EXT2_FS_SECURITY y -EXT2_FS_XATTR y -EXT3_FS_POSIX_ACL y -EXT3_FS_SECURITY y EXT2_FS y -> n EXT3_FS y -> n NLS_ISO8859_1 m -> y NLS_ISO8859_15 m -> y NLS_UTF8 m -> y SCSI_VIRTIO m -> y +EXT4_USE_FOR_EXT2 y kde/calligra-3.2.1-x86_64-35.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/cantor-23.08.2-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/fcitx5-configtool-5.1.2-x86_64-1.txz: Upgraded. kde/kfilemetadata-5.111.0-x86_64-3.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/kile-2.9.93-x86_64-29.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/kitinerary-23.08.2-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/krita-5.2.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. kde/okular-23.08.2-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.11.0. l/pipewire-0.3.84-x86_64-1.txz: Upgraded. l/poppler-23.11.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/postfix-3.8.3-x86_64-1.txz: Upgraded. x/fcitx5-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-hangul-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.2-x86_64-1.txz: Upgraded. x/fcitx5-sayura-5.1.1-x86_64-1.txz: Upgraded. x/libime-1.1.3-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-11-02 21:33:13 +01:00
tar xvf $CWD/${PKGNAM}-$VERSION.tar.?z || exit 1
cd ${PKGNAM}-$VERSION || exit 1
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
Thu Oct 29 21:55:56 UTC 2020 a/aaa_elflibs-15.0-x86_64-26.txz: Rebuilt. Upgraded: liblber-2.4.so.2.11.3, libldap-2.4.so.2.11.3, libmpc.so.3.2.1. Added temporarily to allow for third-party packages to be recompiled: libHalf.so.12.0.0, libIex-2_2.so.12.0.0, libIexMath-2_2.so.12.0.0, libIlmImf-2_2.so.22.0.0, libIlmImfUtil-2_2.so.22.0.0, libIlmThread-2_2.so.12.0.0, libImath-2_2.so.12.0.0, libpoppler-qt4.so.4.11.0, libpoppler.so.79.0.0. a/kernel-generic-5.4.73-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.73-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.73-x86_64-1.txz: Upgraded. d/kernel-headers-5.4.73-x86-1.txz: Upgraded. k/kernel-source-5.4.73-noarch-1.txz: Upgraded. l/LibRaw-0.20.2-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/exiv2-0.27.3-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/gegl-0.4.26-x86_64-2.txz: Rebuilt. Recompiled against openexr-2.5.3. l/gexiv2-0.12.1-x86_64-1.txz: Upgraded. Compiled against exiv2-0.27.3. l/graphene-1.10.2-x86_64-1.txz: Added. l/gst-plugins-base-1.18.1-x86_64-2.txz: Rebuilt. Recompiled against system libgraphene. l/ilmbase-2.2.0-x86_64-2.txz: Removed. These libraries are now part of openexr. l/imagemagick-7.0.10_34-x86_64-2.txz: Rebuilt. Recompiled against LibRaw-0.20.2 and openexr-2.5.3. l/openexr-2.5.3-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/poppler-20.10.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Qt4 support dropped. n/samba-4.13.1-x86_64-1.txz: Upgraded. This update fixes security issues: Missing handle permissions check in SMB1/2/3 ChangeNotify. Denial-of-service vulnerabilities. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383 (* Security fix *) xap/geeqie-1.5.1-x86_64-2.txz: Rebuilt. Recompiled against exiv2-0.27.3. xap/gimp-2.10.22-x86_64-2.txz: Rebuilt. Recompiled against openexr-2.5.3. xap/xlockmore-5.66-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2020-10-29 22:55:56 +01:00
mkdir cmake-build
cd cmake-build
CXXFLAGS="$SLKCFLAGS -std=c++11 -fpermissive" \
cmake \
-DCMAKE_INSTALL_PREFIX=/usr \
-DCMAKE_INSTALL_MANDIR=/usr/man \
-DBUILD_SHARED_LIBS=ON \
Thu Oct 29 21:55:56 UTC 2020 a/aaa_elflibs-15.0-x86_64-26.txz: Rebuilt. Upgraded: liblber-2.4.so.2.11.3, libldap-2.4.so.2.11.3, libmpc.so.3.2.1. Added temporarily to allow for third-party packages to be recompiled: libHalf.so.12.0.0, libIex-2_2.so.12.0.0, libIexMath-2_2.so.12.0.0, libIlmImf-2_2.so.22.0.0, libIlmImfUtil-2_2.so.22.0.0, libIlmThread-2_2.so.12.0.0, libImath-2_2.so.12.0.0, libpoppler-qt4.so.4.11.0, libpoppler.so.79.0.0. a/kernel-generic-5.4.73-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.73-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.73-x86_64-1.txz: Upgraded. d/kernel-headers-5.4.73-x86-1.txz: Upgraded. k/kernel-source-5.4.73-noarch-1.txz: Upgraded. l/LibRaw-0.20.2-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/exiv2-0.27.3-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/gegl-0.4.26-x86_64-2.txz: Rebuilt. Recompiled against openexr-2.5.3. l/gexiv2-0.12.1-x86_64-1.txz: Upgraded. Compiled against exiv2-0.27.3. l/graphene-1.10.2-x86_64-1.txz: Added. l/gst-plugins-base-1.18.1-x86_64-2.txz: Rebuilt. Recompiled against system libgraphene. l/ilmbase-2.2.0-x86_64-2.txz: Removed. These libraries are now part of openexr. l/imagemagick-7.0.10_34-x86_64-2.txz: Rebuilt. Recompiled against LibRaw-0.20.2 and openexr-2.5.3. l/openexr-2.5.3-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/poppler-20.10.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Qt4 support dropped. n/samba-4.13.1-x86_64-1.txz: Upgraded. This update fixes security issues: Missing handle permissions check in SMB1/2/3 ChangeNotify. Denial-of-service vulnerabilities. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14383 (* Security fix *) xap/geeqie-1.5.1-x86_64-2.txz: Rebuilt. Recompiled against exiv2-0.27.3. xap/gimp-2.10.22-x86_64-2.txz: Rebuilt. Recompiled against openexr-2.5.3. xap/xlockmore-5.66-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2020-10-29 22:55:56 +01:00
-DENABLE_QT5=ON \
-DENABLE_XPDF_HEADERS=ON \
-DENABLE_CMS=lcms2 \
-DENABLE_DCTDECODER=libjpeg \
-DENABLE_GTK_DOC=ON \
-DENABLE_LIBOPENJPEG=openjpeg2 \
-DENABLE_XPDF_HEADERS=ON \
-DENABLE_UNSTABLE_API_ABI_HEADERS=ON \
-DENABLE_ZLIB=ON \
Tue Oct 3 22:19:10 UTC 2023 a/aaa_glibc-solibs-2.37-x86_64-3.txz: Rebuilt. a/dialog-1.3_20231002-x86_64-1.txz: Upgraded. ap/mpg123-1.32.3-x86_64-1.txz: Upgraded. d/llvm-17.0.2-x86_64-1.txz: Upgraded. d/meson-1.2.2-x86_64-2.txz: Rebuilt. [PATCH] Revert rust: apply global, project, and environment C args to bindgen. This fixes building Mesa. Thanks to lucabon and marav. kde/calligra-3.2.1-x86_64-34.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/cantor-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kfilemetadata-5.110.0-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kile-2.9.93-x86_64-28.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kitinerary-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/krita-5.1.5-x86_64-15.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/okular-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. l/glibc-2.37-x86_64-3.txz: Rebuilt. l/glibc-i18n-2.37-x86_64-3.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) l/glibc-profile-2.37-x86_64-3.txz: Rebuilt. l/mozilla-nss-3.94-x86_64-1.txz: Upgraded. l/poppler-23.10.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/NetworkManager-1.44.2-x86_64-1.txz: Upgraded. n/irssi-1.4.5-x86_64-1.txz: Upgraded. x/fcitx5-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-gtk-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-hangul-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-kkc-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-m17n-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-sayura-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-extra-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-other-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-unikey-5.1.1-x86_64-1.txz: Upgraded. x/libX11-1.8.7-x86_64-1.txz: Upgraded. This update fixes security issues: libX11: out-of-bounds memory access in _XkbReadKeySyms(). libX11: stack exhaustion from infinite recursion in PutSubImage(). libX11: integer overflow in XCreateImage() leading to a heap overflow. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43785 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://www.cve.org/CVERecord?id=CVE-2023-43787 (* Security fix *) x/libXpm-3.5.17-x86_64-1.txz: Upgraded. This update fixes security issues: libXpm: out of bounds read in XpmCreateXpmImageFromBuffer(). libXpm: out of bounds read on XPM with corrupted colormap. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43788 https://www.cve.org/CVERecord?id=CVE-2023-43789 (* Security fix *) testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-2.38-x86_64-2.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) testing/packages/glibc-i18n-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-profile-2.38-x86_64-2.txz: Rebuilt.
2023-10-04 00:19:10 +02:00
$QT6OPT \
.. || exit 1
make $NUMJOBS || make || exit 1
make install DESTDIR=$PKG || exit 1
# Back to source tarball root directory:
cd ..
# Remove files that overlap with the xpdf package:
rm -f $PKG/usr/bin/pdfdetach $PKG/usr/man/man1/pdfdetach.1
find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \
| cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
# Compress and link manpages, if any:
if [ -d $PKG/usr/man ]; then
( cd $PKG/usr/man
for manpagedir in $(find . -type d -name "man*") ; do
( cd $manpagedir
for eachpage in $( find . -type l -maxdepth 1) ; do
ln -s $( readlink $eachpage ).gz $eachpage.gz
rm $eachpage
done
gzip -9 *.?
)
done
)
fi
mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION
cp -a AUTHORS COPYING* INSTALL NEWS README* TODO \
$PKG/usr/doc/${PKGNAM}-$VERSION
( cd $PKG/usr/doc/${PKGNAM}-$VERSION
ln -s /usr/share/gtk-doc/html/poppler html )
# If there's a ChangeLog, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r ChangeLog ]; then
DOCSDIR=$(echo $PKG/usr/doc/${PKGNAM}-$VERSION)
cat ChangeLog | head -n 1000 > $DOCSDIR/ChangeLog
touch -r ChangeLog $DOCSDIR/ChangeLog
fi
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/${PKGNAM}-$VERSION-$ARCH-$BUILD.txz