1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-15 15:41:54 +01:00
slackware-current/source/n/dovecot/dovecot.SlackBuild

189 lines
5.9 KiB
Text
Raw Normal View History

#!/bin/bash
# Copyright 2006, 2010 Alan Hicks, Lizella, GA
# Copyright 2013, 2014, 2015, 2016, 2017 Mario Preksavec, Zagreb, Croatia
# Copyright 2017, 2018, 2019, 2020 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=dovecot
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
Wed Oct 30 21:03:27 UTC 2024 ap/vim-9.1.0821-x86_64-1.txz: Upgraded. d/llvm-19.1.3-x86_64-1.txz: Upgraded. d/python-setuptools-75.3.0-x86_64-1.txz: Upgraded. l/PyQt5-5.15.11-x86_64-2.txz: Rebuilt. Recompiled to drop the QtWebKit and QtWebKitWidgets bindings. Thanks to jloco. l/libclc-19.1.3-x86_64-1.txz: Upgraded. l/libnl3-3.11.0-x86_64-1.txz: Upgraded. l/lz4-1.10.0-x86_64-2.txz: Rebuilt. Make sure liblz4.pc uses lib${LIBDIRSUFFIX}. Thanks to af7567. l/mozjs128-128.4.0esr-x86_64-1.txz: Upgraded. n/dovecot-2.3.21.1-x86_64-3.txz: Rebuilt. Recompiled using --with-lua. Thanks to Luigi Trovato. n/fetchmail-6.5.0-x86_64-1.txz: Upgraded. n/gnupg2-2.4.6-x86_64-1.txz: Upgraded. x/xf86-input-wacom-1.2.3-x86_64-1.txz: Upgraded. x/xorg-server-21.1.14-x86_64-1.txz: Upgraded. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) x/xorg-server-xephyr-21.1.14-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.14-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.14-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-24.1.4-x86_64-1.txz: Upgraded. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) xap/mozilla-firefox-128.4.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-56/ https://www.cve.org/CVERecord?id=CVE-2024-10458 https://www.cve.org/CVERecord?id=CVE-2024-10459 https://www.cve.org/CVERecord?id=CVE-2024-10460 https://www.cve.org/CVERecord?id=CVE-2024-10461 https://www.cve.org/CVERecord?id=CVE-2024-10462 https://www.cve.org/CVERecord?id=CVE-2024-10463 https://www.cve.org/CVERecord?id=CVE-2024-10464 https://www.cve.org/CVERecord?id=CVE-2024-10465 https://www.cve.org/CVERecord?id=CVE-2024-10466 https://www.cve.org/CVERecord?id=CVE-2024-10467 (* Security fix *) xap/mozilla-thunderbird-128.4.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/ https://www.cve.org/CVERecord?id=CVE-2024-10458 https://www.cve.org/CVERecord?id=CVE-2024-10459 https://www.cve.org/CVERecord?id=CVE-2024-10460 https://www.cve.org/CVERecord?id=CVE-2024-10461 https://www.cve.org/CVERecord?id=CVE-2024-10462 https://www.cve.org/CVERecord?id=CVE-2024-10463 https://www.cve.org/CVERecord?id=CVE-2024-10464 https://www.cve.org/CVERecord?id=CVE-2024-10465 https://www.cve.org/CVERecord?id=CVE-2024-10466 https://www.cve.org/CVERecord?id=CVE-2024-10467 (* Security fix *) xap/vim-gvim-9.1.0821-x86_64-1.txz: Upgraded. xap/xaos-4.3.3-x86_64-1.txz: Upgraded. extra/tigervnc/tigervnc-1.14.1-x86_64-2.txz: Rebuilt. Rebuilt against xorg-server-21.1.14. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *)
2024-10-30 22:03:27 +01:00
BUILD=${BUILD:-3}
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) ARCH=i686 ;;
arm*) ARCH=arm ;;
*) ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
Fri Sep 21 18:51:07 UTC 2018 a/eudev-3.2.6-x86_64-1.txz: Upgraded. a/glibc-solibs-2.28-x86_64-2.txz: Upgraded. a/grub-2.02-x86_64-3.txz: Rebuilt. Patched to fix compatibility with recent xfsprogs. Thanks to Markus Wiesner. a/kernel-generic-4.14.71-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.71-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.71-x86_64-1.txz: Upgraded. ap/opus-tools-0.2-x86_64-1.txz: Upgraded. ap/sqlite-3.25.1-x86_64-1.txz: Upgraded. d/icecream-20180905_cdc6ff8-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.71-x86-1.txz: Upgraded. d/llvm-7.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.14.71-noarch-1.txz: Upgraded. l/ffmpeg-3.4.4-x86_64-2.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. l/glibc-2.28-x86_64-2.txz: Upgraded. All packages have been patched where needed for glibc-2.28 and compile tested here. Thanks to nobodino for the help. l/glibc-i18n-2.28-x86_64-2.txz: Upgraded. l/glibc-profile-2.28-x86_64-2.txz: Upgraded. l/gst-plugins-base-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.14.3-x86_64-1.txz: Upgraded. l/gstreamer-1.14.3-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_11-x86_64-1.txz: Upgraded. l/libopusenc-0.2-x86_64-1.txz: Added. l/librsvg-2.44.3-x86_64-1.txz: Upgraded. l/opus-1.3_rc2-x86_64-1.txz: Upgraded. l/opusfile-0.11-x86_64-1.txz: Upgraded. l/soprano-2.9.4-x86_64-3.txz: Rebuilt. Recompiled to drop virtuoso dependency. l/virtuoso-ose-6.1.8-x86_64-9.txz: Removed. Even KDE4 has migrated away from actually using this for anything. The last thing in Slackware that was dependent on it was Soprano, which has been recompiled to no longer use it. n/postfix-3.3.1-x86_64-2.txz: Rebuilt. Recompiled so that it quits whining about OpenSSL. Thanks to shastah. x/mesa-18.2.1-x86_64-1.txz: Upgraded. Compiled against llvm-7.0.0. x/xf86-video-vmware-13.3.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-7.0.0. x/xterm-336-x86_64-1.txz: Upgraded. extra/pure-alsa-system/ffmpeg-3.4.4-x86_64-2_alsa.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. extra/pure-alsa-system/gst-plugins-good-1.14.3-x86_64-1_alsa.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-09-21 20:51:07 +02:00
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
TMP=${TMP:-/tmp}
PKG=$TMP/package-$PKGNAM
if [ "$ARCH" = "i686" ]; then
SLKCFLAGS="-O2 -march=pentium4 -mtune=generic"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
SLKCFLAGS="-O2 -march=x86-64 -mtune=generic -fPIC"
LIBDIRSUFFIX="64"
else
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
fi
if [ "$(grep "^dovecot:x:94:94" /etc/passwd)" = "" -o \
"$(grep "^dovecot:x:94:" /etc/group)" = "" -o \
"$(grep "^dovenull:x:95:95" /etc/passwd)" = "" -o \
"$(grep "^dovenull:x:95:" /etc/group)" = "" ]; then
cat << EOF
The dovecot and dovenull user/group do not exist on this system.
Before running this script, please add them with the following commands:
groupadd -g 94 dovecot
useradd -d /dev/null -s /bin/false -u 94 -g 94 dovecot
groupadd -g 95 dovenull
useradd -d /dev/null -s /bin/false -u 95 -g 95 dovenull
EOF
exit 1
fi
rm -rf $PKG
mkdir -p $TMP $PKG
cd $TMP
rm -rf $PKGNAM-ce-$VERSION
tar xvf $CWD/$PKGNAM-$VERSION.tar.?z || exit 1
cd $PKGNAM-$VERSION || exit 1
if [ ! -L /lib${LIBDIRSUFFIX}/libpam.so.? ]; then # no PAM
# Ship config set up for authentication from /etc/passwd and /etc/shadow.
zcat $CWD/dovecot.default.shadow.auth.diff.gz | patch -p1 --verbose || exit 1
PAM_OPTIONS="--without-pam"
else # Yes, we have PAM:
mkdir -p $PKG/etc/pam.d
cp -a $CWD/dovecot.pam $PKG/etc/pam.d/dovecot.new
chown root:root $PKG/etc/pam.d/dovecot.new
chmod 644 $PKG/etc/pam.d/dovecot.new
PAM_OPTIONS="--with-pam"
fi
# Since this package installs working config files in /etc/dovecot, there isn't
# any need to send people to /usr/doc. Also, make sure that TLS is recommended.
zcat $CWD/dovecot.config.README.diff.gz | patch -p1 --verbose || exit 1
chown -R root:root .
find -L . \
\( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \
-o -perm 511 \) -exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \
-o -perm 440 -o -perm 400 \) -exec chmod 644 {} \+
# Add -ldl to LDFLAGS for sqlite
CFLAGS="$SLKCFLAGS" \
CXXFLAGS="$SLKCFLAGS" \
Mon Oct 28 21:22:48 UTC 2024 a/aaa_libraries-15.1-x86_64-34.txz: Rebuilt. Upgraded: libcap.so.2.71, libelf-0.192.so, liblzma.so.5.6.3, libcares.so.2.19.1, libexpat.so.1.9.3, libglib-2.0.so.0.8200.2, libgmodule-2.0.so.0.8200.2, libgobject-2.0.so.0.8200.2, libgthread-2.0.so.0.8200.2, libisl.so.23.4.0, libjson-c.so.5.4.0, libpng16.so.16.44.0, libtiff.so.6.1.0, libtiffxx.so.6.1.0, libunistring.so.5.2.0. Removed: libboost_*.so.1.85.0. Added (temporarily): libicudata.so.74.2, libicui18n.so.74.2, libicuio.so.74.2, libicutest.so.74.2, libicutu.so.74.2, libicuuc.so.74.2. a/mkinitrd-1.4.11-x86_64-41.txz: Rebuilt. remove-orphaned-initrds: simplify matching - initrd-${FOO}.img is considered orphaned if there is no vmlinuz-${FOO} (the contents of $FOO are arbitrary). a/pkgtools-15.1-noarch-15.txz: Rebuilt. make-kernel-backup: if we are backing up vmlinuz-${FOO}, then also back up initrd-${FOO}.img if it exists. Don't try to match specific fields. a/xfsprogs-6.11.0-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. ap/mpg123-1.32.8-x86_64-1.txz: Upgraded. ap/sqlite-3.46.1-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. d/mercurial-6.8.2-x86_64-1.txz: Upgraded. d/python-pip-24.3.1-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.27.11-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. kde/kdewebkit-5.116.0-x86_64-1.txz: Removed. Mothing uses this. Obsolete. kde/konsole-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. kde/plasma-workspace-5.27.11.1-x86_64-3.txz: Rebuilt. Recompiled against icu4c-76.1. l/M2Crypto-0.42.0-x86_64-1.txz: Removed. Nothing in Slackware has needed this since crda was removed, and very little elsewhere does. Thanks to lucabon. l/babl-0.1.110-x86_64-1.txz: Upgraded. l/boost-1.86.0-x86_64-3.txz: Rebuilt. Recompiled against icu4c-76.1. l/desktop-file-utils-0.28-x86_64-1.txz: Upgraded. l/gspell-1.14.0-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/harfbuzz-10.0.1-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/icu4c-76.1-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/libcap-2.71-x86_64-1.txz: Upgraded. l/libical-3.0.18-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/libqalculate-5.3.0-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/liburing-2.8-x86_64-1.txz: Upgraded. l/libvisio-0.1.8-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/mozjs128-128.3.1esr-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/nodejs-20.18.0-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. l/qt5-5.15.15_20241016_9f395e3b-x86_64-1.txz: Upgraded. Compiled against icu4c-76.1. l/qt5-webkit-5.212.0_alpha4-x86_64-13.txz: Removed. Nothing uses this except kdewebkit, and nothing uses that. Plus it is unmaintained, obsolete, and likely full of holes. l/qt6-6.7.3_20240920_90e86aee-x86_64-4.txz: Rebuilt. Recompiled against icu4c-76.1. l/vte-0.78.1-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. n/dovecot-2.3.21.1-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. n/netatalk-4.0.3-x86_64-1.txz: Upgraded. n/php-8.3.13-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. n/postfix-3.9.0-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. n/samba-4.21.1-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. n/tin-2.6.3-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. t/texlive-2024.240409-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. extra/brltty/brltty-6.7-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. extra/sendmail/sendmail-8.18.1-x86_64-2.txz: Rebuilt. Recompiled against icu4c-76.1. extra/sendmail/sendmail-cf-8.18.1-noarch-2.txz: Rebuilt. Recompiled against icu4c-76.1.
2024-10-28 22:22:48 +01:00
LDFLAGS="-Wl,--copy-dt-needed-entries -ldl" \
./configure \
--prefix=/usr \
--sysconfdir=/etc \
--libdir=/usr/lib${LIBDIRSUFFIX} \
--localstatedir=/var \
--docdir=/usr/doc/$PKGNAM-$VERSION \
--mandir=/usr/man \
--with-notify=inotify \
$PAM_OPTIONS \
--with-ldap=plugin \
Wed Oct 30 21:03:27 UTC 2024 ap/vim-9.1.0821-x86_64-1.txz: Upgraded. d/llvm-19.1.3-x86_64-1.txz: Upgraded. d/python-setuptools-75.3.0-x86_64-1.txz: Upgraded. l/PyQt5-5.15.11-x86_64-2.txz: Rebuilt. Recompiled to drop the QtWebKit and QtWebKitWidgets bindings. Thanks to jloco. l/libclc-19.1.3-x86_64-1.txz: Upgraded. l/libnl3-3.11.0-x86_64-1.txz: Upgraded. l/lz4-1.10.0-x86_64-2.txz: Rebuilt. Make sure liblz4.pc uses lib${LIBDIRSUFFIX}. Thanks to af7567. l/mozjs128-128.4.0esr-x86_64-1.txz: Upgraded. n/dovecot-2.3.21.1-x86_64-3.txz: Rebuilt. Recompiled using --with-lua. Thanks to Luigi Trovato. n/fetchmail-6.5.0-x86_64-1.txz: Upgraded. n/gnupg2-2.4.6-x86_64-1.txz: Upgraded. x/xf86-input-wacom-1.2.3-x86_64-1.txz: Upgraded. x/xorg-server-21.1.14-x86_64-1.txz: Upgraded. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) x/xorg-server-xephyr-21.1.14-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.14-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.14-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-24.1.4-x86_64-1.txz: Upgraded. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) xap/mozilla-firefox-128.4.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-56/ https://www.cve.org/CVERecord?id=CVE-2024-10458 https://www.cve.org/CVERecord?id=CVE-2024-10459 https://www.cve.org/CVERecord?id=CVE-2024-10460 https://www.cve.org/CVERecord?id=CVE-2024-10461 https://www.cve.org/CVERecord?id=CVE-2024-10462 https://www.cve.org/CVERecord?id=CVE-2024-10463 https://www.cve.org/CVERecord?id=CVE-2024-10464 https://www.cve.org/CVERecord?id=CVE-2024-10465 https://www.cve.org/CVERecord?id=CVE-2024-10466 https://www.cve.org/CVERecord?id=CVE-2024-10467 (* Security fix *) xap/mozilla-thunderbird-128.4.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/ https://www.cve.org/CVERecord?id=CVE-2024-10458 https://www.cve.org/CVERecord?id=CVE-2024-10459 https://www.cve.org/CVERecord?id=CVE-2024-10460 https://www.cve.org/CVERecord?id=CVE-2024-10461 https://www.cve.org/CVERecord?id=CVE-2024-10462 https://www.cve.org/CVERecord?id=CVE-2024-10463 https://www.cve.org/CVERecord?id=CVE-2024-10464 https://www.cve.org/CVERecord?id=CVE-2024-10465 https://www.cve.org/CVERecord?id=CVE-2024-10466 https://www.cve.org/CVERecord?id=CVE-2024-10467 (* Security fix *) xap/vim-gvim-9.1.0821-x86_64-1.txz: Upgraded. xap/xaos-4.3.3-x86_64-1.txz: Upgraded. extra/tigervnc/tigervnc-1.14.1-x86_64-2.txz: Rebuilt. Rebuilt against xorg-server-21.1.14. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *)
2024-10-30 22:03:27 +01:00
--with-lua \
--with-lucene \
--with-mysql \
--with-sqlite \
--with-libcap \
--disable-static \
--build=$ARCH-slackware-linux || exit 1
make $NUMJOBS || make -j1 || exit 1
make install-strip DESTDIR=$PKG || exit 1
# Install sample configuration files:
mkdir -p $PKG/etc/dovecot
cp -a $PKG/usr/doc/$PKGNAM-$VERSION/example-config/* $PKG/etc/dovecot
( cd $PKG/etc/dovecot
for file in *.conf *.ext conf.d/*.conf conf.d/*.ext ; do
mv $file ${file}.new
done
)
mkdir -p $PKG/etc/rc.d
cat $CWD/rc.dovecot > $PKG/etc/rc.d/rc.dovecot.new
chmod 0644 $PKG/etc/rc.d/rc.dovecot.new
# Compress and link manpages, if any:
if [ -d $PKG/usr/man ]; then
( cd $PKG/usr/man
for manpagedir in $(find . -type d -name "man*") ; do
( cd $manpagedir
for eachpage in $( find . -type l -maxdepth 1 | grep -v '\.gz$') ; do
ln -s $( readlink $eachpage ).gz $eachpage.gz
rm $eachpage
done
gzip -9 *.?
)
done
)
fi
cp -a \
AUTHORS COPYING* ChangeLog NEWS README TODO \
$PKG/usr/doc/$PKGNAM-$VERSION/
# If there's a ChangeLog, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r ChangeLog ]; then
DOCSDIR=$(echo $PKG/usr/doc/${PKGNAM}-$VERSION)
cat ChangeLog | head -n 1000 > $DOCSDIR/ChangeLog
touch -r ChangeLog $DOCSDIR/ChangeLog
fi
# If there's a NEWS file, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r NEWS ]; then
DOCSDIR=$(echo $PKG/usr/doc/${PKGNAM}-$VERSION)
cat NEWS | head -n 1000 > $DOCSDIR/NEWS
touch -r NEWS $DOCSDIR/NEWS
fi
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
cd $PKG
/sbin/makepkg -l y -c n $TMP/$PKGNAM-$VERSION-$ARCH-$BUILD.txz