slackware-current/source/xap/gimp/gimp.SlackBuild

149 lines
4.6 KiB
Text
Raw Normal View History

#!/bin/bash
# Copyright 2008, 2009, 2010, 2011, 2015, 2018, 2020, 2024 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=gimp
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
Tue Oct 1 18:01:38 UTC 2024 Several ELF objects were found to have rpaths pointing into /tmp, a world writable directory. This could have allowed a local attacker to launch denial of service attacks or execute arbitrary code when the affected binaries are run by placing crafted ELF objects in the /tmp rpath location. All rpaths with an embedded /tmp path have been scrubbed from the binaries, and makepkg has gained a lint feature to detect these so that they won't creep back in. a/kernel-firmware-20241001_95bfe08-noarch-1.txz: Upgraded. a/kernel-generic-6.10.12-x86_64-1.txz: Upgraded. a/pkgtools-15.1-noarch-12.txz: Rebuilt. makepkg: when looking for ELF objects with --remove-rpaths or --remove-tmp-rpaths, avoid false hits on files containing 'ELF' as part of the directory or filename. Also warn about /tmp rpaths after the package is built. ap/cups-2.4.11-x86_64-1.txz: Upgraded. ap/cups-browsed-2.0.1-x86_64-2.txz: Rebuilt. Mitigate security issue that could lead to a denial of service or the execution of arbitrary code. Rebuilt with --with-browseremoteprotocols=none to disable incoming connections, since this daemon has been shown to be insecure. If you actually use cups-browsed, be sure to install the new /etc/cups/cups-browsed.conf.new containing this line: BrowseRemoteProtocols none For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-47176 (* Security fix *) d/kernel-headers-6.10.12-x86-1.txz: Upgraded. d/llvm-18.1.8-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) d/luajit-2.1.1727621189-x86_64-1.txz: Upgraded. d/ruby-3.3.5-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) k/kernel-source-6.10.12-noarch-1.txz: Upgraded. kde/kimageformats-5.116.0-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/kio-extras-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/krita-5.2.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/libindi-2.1.0-x86_64-1.txz: Upgraded. l/cryfs-0.10.3-x86_64-13.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/espeak-ng-1.51.1-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/ffmpeg-7.1-x86_64-1.txz: Upgraded. l/gegl-0.4.48-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/gst-plugins-bad-free-1.24.8-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/imagemagick-7.1.1_38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/libgsf-1.14.53-x86_64-1.txz: Upgraded. l/librsvg-2.58.5-x86_64-1.txz: Upgraded. l/libvncserver-0.9.14-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/mozjs128-128.3.0esr-x86_64-1.txz: Upgraded. l/netpbm-11.08.00-x86_64-1.txz: Upgraded. l/opencv-4.10.0-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/openexr-3.3.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/python-glad2-2.0.8-x86_64-1.txz: Upgraded. l/python-pyproject-hooks-1.2.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-18.1.4-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/woff2-20231106_0f4d304-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) n/openobex-1.7.2-x86_64-6.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) x/marisa-0.2.6-x86_64-11.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) xap/gimp-2.10.38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. xap/mozilla-firefox-128.3.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.3.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-47 https://www.cve.org/CVERecord?id=CVE-2024-9392 https://www.cve.org/CVERecord?id=CVE-2024-9393 https://www.cve.org/CVERecord?id=CVE-2024-9394 https://www.cve.org/CVERecord?id=CVE-2024-8900 https://www.cve.org/CVERecord?id=CVE-2024-9396 https://www.cve.org/CVERecord?id=CVE-2024-9397 https://www.cve.org/CVERecord?id=CVE-2024-9398 https://www.cve.org/CVERecord?id=CVE-2024-9399 https://www.cve.org/CVERecord?id=CVE-2024-9400 https://www.cve.org/CVERecord?id=CVE-2024-9401 https://www.cve.org/CVERecord?id=CVE-2024-9402 (* Security fix *) xap/xlockmore-5.80-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/kernel-generic-6.11.1-x86_64-1.txz: Upgraded. testing/packages/kernel-headers-6.11.1-x86-1.txz: Upgraded. testing/packages/kernel-source-6.11.1-noarch-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2024-10-01 20:01:38 +02:00
BUILD=${BUILD:-2}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
Tue Oct 1 18:01:38 UTC 2024 Several ELF objects were found to have rpaths pointing into /tmp, a world writable directory. This could have allowed a local attacker to launch denial of service attacks or execute arbitrary code when the affected binaries are run by placing crafted ELF objects in the /tmp rpath location. All rpaths with an embedded /tmp path have been scrubbed from the binaries, and makepkg has gained a lint feature to detect these so that they won't creep back in. a/kernel-firmware-20241001_95bfe08-noarch-1.txz: Upgraded. a/kernel-generic-6.10.12-x86_64-1.txz: Upgraded. a/pkgtools-15.1-noarch-12.txz: Rebuilt. makepkg: when looking for ELF objects with --remove-rpaths or --remove-tmp-rpaths, avoid false hits on files containing 'ELF' as part of the directory or filename. Also warn about /tmp rpaths after the package is built. ap/cups-2.4.11-x86_64-1.txz: Upgraded. ap/cups-browsed-2.0.1-x86_64-2.txz: Rebuilt. Mitigate security issue that could lead to a denial of service or the execution of arbitrary code. Rebuilt with --with-browseremoteprotocols=none to disable incoming connections, since this daemon has been shown to be insecure. If you actually use cups-browsed, be sure to install the new /etc/cups/cups-browsed.conf.new containing this line: BrowseRemoteProtocols none For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-47176 (* Security fix *) d/kernel-headers-6.10.12-x86-1.txz: Upgraded. d/llvm-18.1.8-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) d/luajit-2.1.1727621189-x86_64-1.txz: Upgraded. d/ruby-3.3.5-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) k/kernel-source-6.10.12-noarch-1.txz: Upgraded. kde/kimageformats-5.116.0-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/kio-extras-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/krita-5.2.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/libindi-2.1.0-x86_64-1.txz: Upgraded. l/cryfs-0.10.3-x86_64-13.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/espeak-ng-1.51.1-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/ffmpeg-7.1-x86_64-1.txz: Upgraded. l/gegl-0.4.48-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/gst-plugins-bad-free-1.24.8-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/imagemagick-7.1.1_38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/libgsf-1.14.53-x86_64-1.txz: Upgraded. l/librsvg-2.58.5-x86_64-1.txz: Upgraded. l/libvncserver-0.9.14-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/mozjs128-128.3.0esr-x86_64-1.txz: Upgraded. l/netpbm-11.08.00-x86_64-1.txz: Upgraded. l/opencv-4.10.0-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/openexr-3.3.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/python-glad2-2.0.8-x86_64-1.txz: Upgraded. l/python-pyproject-hooks-1.2.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-18.1.4-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/woff2-20231106_0f4d304-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) n/openobex-1.7.2-x86_64-6.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) x/marisa-0.2.6-x86_64-11.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) xap/gimp-2.10.38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. xap/mozilla-firefox-128.3.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.3.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-47 https://www.cve.org/CVERecord?id=CVE-2024-9392 https://www.cve.org/CVERecord?id=CVE-2024-9393 https://www.cve.org/CVERecord?id=CVE-2024-9394 https://www.cve.org/CVERecord?id=CVE-2024-8900 https://www.cve.org/CVERecord?id=CVE-2024-9396 https://www.cve.org/CVERecord?id=CVE-2024-9397 https://www.cve.org/CVERecord?id=CVE-2024-9398 https://www.cve.org/CVERecord?id=CVE-2024-9399 https://www.cve.org/CVERecord?id=CVE-2024-9400 https://www.cve.org/CVERecord?id=CVE-2024-9401 https://www.cve.org/CVERecord?id=CVE-2024-9402 (* Security fix *) xap/xlockmore-5.80-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/kernel-generic-6.11.1-x86_64-1.txz: Upgraded. testing/packages/kernel-headers-6.11.1-x86-1.txz: Upgraded. testing/packages/kernel-source-6.11.1-noarch-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2024-10-01 20:01:38 +02:00
i?86) export ARCH=i686 ;;
arm*) export ARCH=arm ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) export ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
Fri Sep 21 18:51:07 UTC 2018 a/eudev-3.2.6-x86_64-1.txz: Upgraded. a/glibc-solibs-2.28-x86_64-2.txz: Upgraded. a/grub-2.02-x86_64-3.txz: Rebuilt. Patched to fix compatibility with recent xfsprogs. Thanks to Markus Wiesner. a/kernel-generic-4.14.71-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.71-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.71-x86_64-1.txz: Upgraded. ap/opus-tools-0.2-x86_64-1.txz: Upgraded. ap/sqlite-3.25.1-x86_64-1.txz: Upgraded. d/icecream-20180905_cdc6ff8-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.71-x86-1.txz: Upgraded. d/llvm-7.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.14.71-noarch-1.txz: Upgraded. l/ffmpeg-3.4.4-x86_64-2.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. l/glibc-2.28-x86_64-2.txz: Upgraded. All packages have been patched where needed for glibc-2.28 and compile tested here. Thanks to nobodino for the help. l/glibc-i18n-2.28-x86_64-2.txz: Upgraded. l/glibc-profile-2.28-x86_64-2.txz: Upgraded. l/gst-plugins-base-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.14.3-x86_64-1.txz: Upgraded. l/gstreamer-1.14.3-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_11-x86_64-1.txz: Upgraded. l/libopusenc-0.2-x86_64-1.txz: Added. l/librsvg-2.44.3-x86_64-1.txz: Upgraded. l/opus-1.3_rc2-x86_64-1.txz: Upgraded. l/opusfile-0.11-x86_64-1.txz: Upgraded. l/soprano-2.9.4-x86_64-3.txz: Rebuilt. Recompiled to drop virtuoso dependency. l/virtuoso-ose-6.1.8-x86_64-9.txz: Removed. Even KDE4 has migrated away from actually using this for anything. The last thing in Slackware that was dependent on it was Soprano, which has been recompiled to no longer use it. n/postfix-3.3.1-x86_64-2.txz: Rebuilt. Recompiled so that it quits whining about OpenSSL. Thanks to shastah. x/mesa-18.2.1-x86_64-1.txz: Upgraded. Compiled against llvm-7.0.0. x/xf86-video-vmware-13.3.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-7.0.0. x/xterm-336-x86_64-1.txz: Upgraded. extra/pure-alsa-system/ffmpeg-3.4.4-x86_64-2_alsa.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. extra/pure-alsa-system/gst-plugins-good-1.14.3-x86_64-1_alsa.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-09-21 20:51:07 +02:00
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
TMP=${TMP:-/tmp}
PKG=$TMP/package-gimp
rm -rf $PKG
mkdir -p $TMP $PKG
Tue Oct 1 18:01:38 UTC 2024 Several ELF objects were found to have rpaths pointing into /tmp, a world writable directory. This could have allowed a local attacker to launch denial of service attacks or execute arbitrary code when the affected binaries are run by placing crafted ELF objects in the /tmp rpath location. All rpaths with an embedded /tmp path have been scrubbed from the binaries, and makepkg has gained a lint feature to detect these so that they won't creep back in. a/kernel-firmware-20241001_95bfe08-noarch-1.txz: Upgraded. a/kernel-generic-6.10.12-x86_64-1.txz: Upgraded. a/pkgtools-15.1-noarch-12.txz: Rebuilt. makepkg: when looking for ELF objects with --remove-rpaths or --remove-tmp-rpaths, avoid false hits on files containing 'ELF' as part of the directory or filename. Also warn about /tmp rpaths after the package is built. ap/cups-2.4.11-x86_64-1.txz: Upgraded. ap/cups-browsed-2.0.1-x86_64-2.txz: Rebuilt. Mitigate security issue that could lead to a denial of service or the execution of arbitrary code. Rebuilt with --with-browseremoteprotocols=none to disable incoming connections, since this daemon has been shown to be insecure. If you actually use cups-browsed, be sure to install the new /etc/cups/cups-browsed.conf.new containing this line: BrowseRemoteProtocols none For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-47176 (* Security fix *) d/kernel-headers-6.10.12-x86-1.txz: Upgraded. d/llvm-18.1.8-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) d/luajit-2.1.1727621189-x86_64-1.txz: Upgraded. d/ruby-3.3.5-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) k/kernel-source-6.10.12-noarch-1.txz: Upgraded. kde/kimageformats-5.116.0-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/kio-extras-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/krita-5.2.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/libindi-2.1.0-x86_64-1.txz: Upgraded. l/cryfs-0.10.3-x86_64-13.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/espeak-ng-1.51.1-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/ffmpeg-7.1-x86_64-1.txz: Upgraded. l/gegl-0.4.48-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/gst-plugins-bad-free-1.24.8-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/imagemagick-7.1.1_38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/libgsf-1.14.53-x86_64-1.txz: Upgraded. l/librsvg-2.58.5-x86_64-1.txz: Upgraded. l/libvncserver-0.9.14-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/mozjs128-128.3.0esr-x86_64-1.txz: Upgraded. l/netpbm-11.08.00-x86_64-1.txz: Upgraded. l/opencv-4.10.0-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/openexr-3.3.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/python-glad2-2.0.8-x86_64-1.txz: Upgraded. l/python-pyproject-hooks-1.2.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-18.1.4-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/woff2-20231106_0f4d304-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) n/openobex-1.7.2-x86_64-6.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) x/marisa-0.2.6-x86_64-11.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) xap/gimp-2.10.38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. xap/mozilla-firefox-128.3.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.3.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-47 https://www.cve.org/CVERecord?id=CVE-2024-9392 https://www.cve.org/CVERecord?id=CVE-2024-9393 https://www.cve.org/CVERecord?id=CVE-2024-9394 https://www.cve.org/CVERecord?id=CVE-2024-8900 https://www.cve.org/CVERecord?id=CVE-2024-9396 https://www.cve.org/CVERecord?id=CVE-2024-9397 https://www.cve.org/CVERecord?id=CVE-2024-9398 https://www.cve.org/CVERecord?id=CVE-2024-9399 https://www.cve.org/CVERecord?id=CVE-2024-9400 https://www.cve.org/CVERecord?id=CVE-2024-9401 https://www.cve.org/CVERecord?id=CVE-2024-9402 (* Security fix *) xap/xlockmore-5.80-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/kernel-generic-6.11.1-x86_64-1.txz: Upgraded. testing/packages/kernel-headers-6.11.1-x86-1.txz: Upgraded. testing/packages/kernel-source-6.11.1-noarch-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2024-10-01 20:01:38 +02:00
if [ "$ARCH" = "i686" ]; then
SLKCFLAGS="-O2 -march=pentium4 -mtune=generic"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
Tue Oct 1 18:01:38 UTC 2024 Several ELF objects were found to have rpaths pointing into /tmp, a world writable directory. This could have allowed a local attacker to launch denial of service attacks or execute arbitrary code when the affected binaries are run by placing crafted ELF objects in the /tmp rpath location. All rpaths with an embedded /tmp path have been scrubbed from the binaries, and makepkg has gained a lint feature to detect these so that they won't creep back in. a/kernel-firmware-20241001_95bfe08-noarch-1.txz: Upgraded. a/kernel-generic-6.10.12-x86_64-1.txz: Upgraded. a/pkgtools-15.1-noarch-12.txz: Rebuilt. makepkg: when looking for ELF objects with --remove-rpaths or --remove-tmp-rpaths, avoid false hits on files containing 'ELF' as part of the directory or filename. Also warn about /tmp rpaths after the package is built. ap/cups-2.4.11-x86_64-1.txz: Upgraded. ap/cups-browsed-2.0.1-x86_64-2.txz: Rebuilt. Mitigate security issue that could lead to a denial of service or the execution of arbitrary code. Rebuilt with --with-browseremoteprotocols=none to disable incoming connections, since this daemon has been shown to be insecure. If you actually use cups-browsed, be sure to install the new /etc/cups/cups-browsed.conf.new containing this line: BrowseRemoteProtocols none For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-47176 (* Security fix *) d/kernel-headers-6.10.12-x86-1.txz: Upgraded. d/llvm-18.1.8-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) d/luajit-2.1.1727621189-x86_64-1.txz: Upgraded. d/ruby-3.3.5-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) k/kernel-source-6.10.12-noarch-1.txz: Upgraded. kde/kimageformats-5.116.0-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/kio-extras-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/krita-5.2.5-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. kde/libindi-2.1.0-x86_64-1.txz: Upgraded. l/cryfs-0.10.3-x86_64-13.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/espeak-ng-1.51.1-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/ffmpeg-7.1-x86_64-1.txz: Upgraded. l/gegl-0.4.48-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/gst-plugins-bad-free-1.24.8-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/imagemagick-7.1.1_38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. l/libgsf-1.14.53-x86_64-1.txz: Upgraded. l/librsvg-2.58.5-x86_64-1.txz: Upgraded. l/libvncserver-0.9.14-x86_64-3.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/mozjs128-128.3.0esr-x86_64-1.txz: Upgraded. l/netpbm-11.08.00-x86_64-1.txz: Upgraded. l/opencv-4.10.0-x86_64-3.txz: Rebuilt. Recompiled against openexr-3.3.0. l/openexr-3.3.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/python-glad2-2.0.8-x86_64-1.txz: Upgraded. l/python-pyproject-hooks-1.2.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-18.1.4-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) l/woff2-20231106_0f4d304-x86_64-2.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) n/openobex-1.7.2-x86_64-6.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) x/marisa-0.2.6-x86_64-11.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) xap/gimp-2.10.38-x86_64-2.txz: Rebuilt. Recompiled against openexr-3.3.0. xap/mozilla-firefox-128.3.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.3.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-47 https://www.cve.org/CVERecord?id=CVE-2024-9392 https://www.cve.org/CVERecord?id=CVE-2024-9393 https://www.cve.org/CVERecord?id=CVE-2024-9394 https://www.cve.org/CVERecord?id=CVE-2024-8900 https://www.cve.org/CVERecord?id=CVE-2024-9396 https://www.cve.org/CVERecord?id=CVE-2024-9397 https://www.cve.org/CVERecord?id=CVE-2024-9398 https://www.cve.org/CVERecord?id=CVE-2024-9399 https://www.cve.org/CVERecord?id=CVE-2024-9400 https://www.cve.org/CVERecord?id=CVE-2024-9401 https://www.cve.org/CVERecord?id=CVE-2024-9402 (* Security fix *) xap/xlockmore-5.80-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/kernel-generic-6.11.1-x86_64-1.txz: Upgraded. testing/packages/kernel-headers-6.11.1-x86-1.txz: Upgraded. testing/packages/kernel-source-6.11.1-noarch-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2024-10-01 20:01:38 +02:00
SLKCFLAGS="-O2 -march=x86-64 -mtune=generic -fPIC"
LIBDIRSUFFIX="64"
else
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
fi
# GCC 14 "fix":
SLKCFLAGS="$SLKCFLAGS -Wno-error=incompatible-pointer-types"
cd $TMP
rm -rf gimp-$VERSION
tar xvf $CWD/gimp-$VERSION.tar.?z || exit 1
cd gimp-$VERSION || exit 1
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
CFLAGS="$SLKCFLAGS" \
./configure \
--prefix=/usr \
--libdir=/usr/lib${LIBDIRSUFFIX} \
--sysconfdir=/etc \
--localstatedir=/var/lib \
--mandir=/usr/man \
--infodir=/usr/info \
--docdir=/usr/doc/gimp-$VERSION \
--disable-static \
Thu Feb 20 04:50:54 UTC 2020 a/gptfdisk-1.0.5-x86_64-1.txz: Upgraded. a/kernel-firmware-20200219_2277987-noarch-1.txz: Upgraded. a/kernel-generic-5.4.21-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.21-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.21-x86_64-1.txz: Upgraded. a/shadow-4.8.1-x86_64-5.txz: Rebuilt. a/util-linux-2.35.1-x86_64-4.txz: Rebuilt. ap/cdparanoia-III_10.2-x86_64-3.txz: Rebuilt. Moved man page from /usr/man/jp/man1/ to /usr/man/ja/man1/. Thanks to Xsane. Don't ship the static libraries. d/kernel-headers-5.4.21-x86-1.txz: Upgraded. k/kernel-source-5.4.21-noarch-1.txz: Upgraded. SND_SOC n -> m SPI n -> y VFIO_PCI_VGA n -> y +ADE7854_SPI m +ADT7316_SPI m +BMC150_ACCEL_SPI m +BMG160_SPI m +BMP280_SPI m +FXAS21002C_SPI m +HTS221_SPI m +IIO_ST_ACCEL_SPI_3AXIS m +IIO_ST_GYRO_SPI_3AXIS m +IIO_ST_MAGN_SPI_3AXIS m +IIO_ST_PRESS_SPI m +IIO_ST_SENSORS_SPI m +INPUT_AD714X_SPI m +INPUT_ADXL34X_SPI m +KXSD9_SPI m +REGMAP_SPI m +SND_COMPRESS_OFFLOAD m +SND_DESIGNWARE_I2S m +SND_DESIGNWARE_PCM y +SND_DMAENGINE_PCM m +SND_HDA_EXT_CORE m +SND_I2S_HI6210_I2S m +SND_PCM_ELD y +SND_PCM_IEC958 y +SND_SIMPLE_CARD m +SND_SIMPLE_CARD_UTILS m +SND_SOC_AC97_BUS y +SND_SOC_AC97_CODEC m +SND_SOC_ACPI m +SND_SOC_ACPI_INTEL_MATCH m +SND_SOC_ADAU1761 m +SND_SOC_ADAU1761_I2C m +SND_SOC_ADAU1761_SPI m +SND_SOC_ADAU17X1 m +SND_SOC_ADAU7002 m +SND_SOC_ADAU_UTILS m +SND_SOC_AMD_ACP m +SND_SOC_AMD_ACP3x m +SND_SOC_AMD_CZ_DA7219MX98357_MACH m +SND_SOC_AMD_CZ_RT5645_MACH m +SND_SOC_BD28623 m +SND_SOC_COMPRESS y +SND_SOC_CROS_EC_CODEC m +SND_SOC_CS35L34 m +SND_SOC_CS35L35 m +SND_SOC_CS35L36 m +SND_SOC_CS42L42 m +SND_SOC_CS43130 m +SND_SOC_CX2072X m +SND_SOC_DA7213 m +SND_SOC_DA7219 m +SND_SOC_DMIC m +SND_SOC_ES7134 m +SND_SOC_ES7241 m +SND_SOC_ES8316 m +SND_SOC_ES8328 m +SND_SOC_ES8328_I2C m +SND_SOC_ES8328_SPI m +SND_SOC_GENERIC_DMAENGINE_PCM y +SND_SOC_HDAC_HDA m +SND_SOC_HDAC_HDMI m +SND_SOC_HDMI_CODEC m +SND_SOC_I2C_AND_SPI m +SND_SOC_INTEL_APL m +SND_SOC_INTEL_BDW_RT5677_MACH m +SND_SOC_INTEL_BROADWELL_MACH m +SND_SOC_INTEL_BXT_DA7219_MAX98357A_MACH m +SND_SOC_INTEL_BXT_RT298_MACH m +SND_SOC_INTEL_BYTCR_RT5640_MACH m +SND_SOC_INTEL_BYTCR_RT5651_MACH m +SND_SOC_INTEL_BYT_CHT_CX2072X_MACH m +SND_SOC_INTEL_BYT_CHT_DA7213_MACH m +SND_SOC_INTEL_BYT_CHT_ES8316_MACH m +SND_SOC_INTEL_BYT_CHT_NOCODEC_MACH m +SND_SOC_INTEL_CFL m +SND_SOC_INTEL_CHT_BSW_MAX98090_TI_MACH m +SND_SOC_INTEL_CHT_BSW_NAU8824_MACH m +SND_SOC_INTEL_CHT_BSW_RT5645_MACH m +SND_SOC_INTEL_CHT_BSW_RT5672_MACH m +SND_SOC_INTEL_CML_H m +SND_SOC_INTEL_CML_LP m +SND_SOC_INTEL_CNL m +SND_SOC_INTEL_DA7219_MAX98357A_GENERIC m +SND_SOC_INTEL_GLK m +SND_SOC_INTEL_GLK_RT5682_MAX98357A_MACH m +SND_SOC_INTEL_HASWELL m +SND_SOC_INTEL_HASWELL_MACH m +SND_SOC_INTEL_KBL m +SND_SOC_INTEL_KBL_DA7219_MAX98357A_MACH m +SND_SOC_INTEL_KBL_DA7219_MAX98927_MACH m +SND_SOC_INTEL_KBL_RT5660_MACH m +SND_SOC_INTEL_KBL_RT5663_MAX98927_MACH m +SND_SOC_INTEL_MACH y +SND_SOC_INTEL_SKL m +SND_SOC_INTEL_SKL_NAU88L25_MAX98357A_MACH m +SND_SOC_INTEL_SKL_NAU88L25_SSM4567_MACH m +SND_SOC_INTEL_SKL_RT286_MACH m +SND_SOC_INTEL_SKYLAKE m +SND_SOC_INTEL_SKYLAKE_COMMON m +SND_SOC_INTEL_SKYLAKE_FAMILY m +SND_SOC_INTEL_SKYLAKE_HDAUDIO_CODEC y +SND_SOC_INTEL_SKYLAKE_SSP_CLK m +SND_SOC_INTEL_SST m +SND_SOC_INTEL_SST_ACPI m +SND_SOC_INTEL_SST_FIRMWARE m +SND_SOC_INTEL_SST_TOPLEVEL y +SND_SOC_MAX9759 m +SND_SOC_MAX98088 m +SND_SOC_MAX98090 m +SND_SOC_MAX98357A m +SND_SOC_MAX98373 m +SND_SOC_MAX9867 m +SND_SOC_MAX98927 m +SND_SOC_NAU8540 m +SND_SOC_NAU8824 m +SND_SOC_NAU8825 m +SND_SOC_PCM1789 m +SND_SOC_PCM1789_I2C m +SND_SOC_PCM186X m +SND_SOC_PCM186X_I2C m +SND_SOC_PCM186X_SPI m +SND_SOC_PCM3060 m +SND_SOC_PCM3060_I2C m +SND_SOC_PCM3060_SPI m +SND_SOC_RL6231 m +SND_SOC_RL6347A m +SND_SOC_RT286 m +SND_SOC_RT298 m +SND_SOC_RT5640 m +SND_SOC_RT5645 m +SND_SOC_RT5651 m +SND_SOC_RT5660 m +SND_SOC_RT5663 m +SND_SOC_RT5670 m +SND_SOC_RT5677 m +SND_SOC_RT5677_SPI m +SND_SOC_RT5682 m +SND_SOC_SIGMADSP m +SND_SOC_SIGMADSP_REGMAP m +SND_SOC_SIMPLE_AMPLIFIER m +SND_SOC_SOF m +SND_SOC_SOF_ACPI m +SND_SOC_SOF_APOLLOLAKE m +SND_SOC_SOF_APOLLOLAKE_SUPPORT y +SND_SOC_SOF_BAYTRAIL m +SND_SOC_SOF_BAYTRAIL_SUPPORT y +SND_SOC_SOF_CANNONLAKE m +SND_SOC_SOF_CANNONLAKE_SUPPORT y +SND_SOC_SOF_COFFEELAKE m +SND_SOC_SOF_COFFEELAKE_SUPPORT y +SND_SOC_SOF_COMETLAKE_H m +SND_SOC_SOF_COMETLAKE_H_SUPPORT y +SND_SOC_SOF_COMETLAKE_LP m +SND_SOC_SOF_COMETLAKE_LP_SUPPORT y +SND_SOC_SOF_ELKHARTLAKE m +SND_SOC_SOF_ELKHARTLAKE_SUPPORT y +SND_SOC_SOF_GEMINILAKE m +SND_SOC_SOF_GEMINILAKE_SUPPORT y +SND_SOC_SOF_HDA m +SND_SOC_SOF_HDA_AUDIO_CODEC y +SND_SOC_SOF_HDA_COMMON m +SND_SOC_SOF_HDA_LINK y +SND_SOC_SOF_HDA_LINK_BASELINE m +SND_SOC_SOF_ICELAKE m +SND_SOC_SOF_ICELAKE_SUPPORT y +SND_SOC_SOF_INTEL_ACPI m +SND_SOC_SOF_INTEL_ATOM_HIFI_EP m +SND_SOC_SOF_INTEL_COMMON m +SND_SOC_SOF_INTEL_HIFI_EP_IPC m +SND_SOC_SOF_INTEL_PCI m +SND_SOC_SOF_INTEL_TOPLEVEL y +SND_SOC_SOF_MERRIFIELD m +SND_SOC_SOF_MERRIFIELD_SUPPORT y +SND_SOC_SOF_OPTIONS m +SND_SOC_SOF_PCI m +SND_SOC_SOF_PROBE_WORK_QUEUE y +SND_SOC_SOF_TIGERLAKE m +SND_SOC_SOF_TIGERLAKE_SUPPORT y +SND_SOC_SOF_TOPLEVEL y +SND_SOC_SOF_XTENSA m +SND_SOC_SPDIF m +SND_SOC_SSM4567 m +SND_SOC_TAS6424 m +SND_SOC_TDA7419 m +SND_SOC_TLV320AIC32X4 m +SND_SOC_TLV320AIC32X4_I2C m +SND_SOC_TLV320AIC32X4_SPI m +SND_SOC_TOPOLOGY y +SND_SOC_TS3A227E m +SND_SOC_TSCS42XX m +SND_SOC_WM8524 m +SND_SPI y +SND_SST_ATOM_HIFI2_PLATFORM m +SND_SST_ATOM_HIFI2_PLATFORM_ACPI m +SND_SST_ATOM_HIFI2_PLATFORM_PCI m +SND_SST_IPC m +SND_SST_IPC_ACPI m +SND_SST_IPC_PCI m +SPI_MASTER y +ST_UVIS25_SPI m l/gegl-0.4.22-x86_64-1.txz: Upgraded. l/glib2-2.62.5-x86_64-1.txz: Upgraded. l/python-requests-2.23.0-x86_64-1.txz: Upgraded. n/NetworkManager-1.22.8-x86_64-1.txz: Upgraded. n/openssh-8.2p1-x86_64-2.txz: Rebuilt. n/php-7.4.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: Phar: Files added to tar with Phar::buildFromIterator have all-access permissions. Phar: heap-buffer-overflow in phar_extract_file. Session: Null Pointer Dereference in PHP Session Upload Progress. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062 (* Security fix *) x/mesa-20.0.0-x86_64-1.txz: Upgraded. Added Wayland platform support. x/wayland-1.18.0-x86_64-1.txz: Added. x/wayland-protocols-1.18-noarch-1.txz: Added. x/xorg-server-1.20.7-x86_64-2.txz: Rebuilt. x/xorg-server-xephyr-1.20.7-x86_64-2.txz: Rebuilt. x/xorg-server-xnest-1.20.7-x86_64-2.txz: Rebuilt. x/xorg-server-xvfb-1.20.7-x86_64-2.txz: Rebuilt. x/xorg-server-xwayland-1.20.7-x86_64-2.txz: Added. xap/gimp-2.10.16-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/PAM/openssh-8.2p1-x86_64-2_pam.txz: Rebuilt. /etc/pam.d/sshd: add commented out pam_tally2 example. testing/packages/PAM/shadow-4.8.1-x86_64-5_pam.txz: Rebuilt. /etc/pam.d/system-auth: add support for pam_group, remove pam_tally2. Thanks to ivandi. /etc/pam.d/*: Don't use tabs. testing/packages/PAM/util-linux-2.35.1-x86_64-4_pam.txz: Rebuilt. /etc/pam.d/login: add commented out pam_tally2 example. /etc/pam.d/*: Don't use tabs. usb-and-pxe-installers/usbboot.img: Rebuilt.
2020-02-20 05:50:54 +01:00
--disable-check-update \
--build=$ARCH-slackware-linux || exit 1
make $NUMJOBS || make || exit 1
mkdir -p $PKG/usr/share/applications $PKG/usr/share/application-registry
make install DESTDIR=$PKG || exit 1
# Don't ship .la files:
rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la
# Add a manpage symlink for POLA-compliance
if [ -r $PKG/usr/man/man1/gimptool-2.?.1 -a ! -r $PKG/usr/man/man1/gimptool.1 ]; then
( cd $PKG/usr/man/man1 ; ln -sf gimptool-2.?.1 gimptool.1 )
fi
# Compress and link manpages, if any:
if [ -d $PKG/usr/man ]; then
( cd $PKG/usr/man
for manpagedir in $(find . -type d -name "man*") ; do
( cd $manpagedir
for eachpage in $( find . -type l -maxdepth 1) ; do
ln -s $( readlink $eachpage ).gz $eachpage.gz
rm $eachpage
done
gzip -9 *.?
)
done
)
fi
mkdir -p $PKG/usr/doc/gimp-$VERSION
cp -a \
AUTHORS COPYING* HACKING INSTALL LICENSE NEWS README* docs/Wilber* \
$PKG/usr/doc/gimp-$VERSION
( cd $PKG/usr/doc/gimp-$VERSION
for i in \
libgimp libgimpbase libgimpcolor libgimpconfig libgimpmath \
libgimpmodule libgimpthumb libgimpwidgets ; do \
ln -s /usr/share/gtk-doc/html/$i $i-html ;
done
)
# If there's a ChangeLog, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r ChangeLog ]; then
DOCSDIR=$(echo $PKG/usr/doc/*-$VERSION)
cat ChangeLog | head -n 1000 > $DOCSDIR/ChangeLog
touch -r ChangeLog $DOCSDIR/ChangeLog
fi
find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \
| cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/gimp-$VERSION-$ARCH-$BUILD.txz