mirror of
git://slackware.nl/current.git
synced 2024-12-26 09:58:59 +01:00
Wed Jan 4 02:18:08 UTC 2023
ap/lsof-4.96.5-x86_64-1.txz: Upgraded. ap/sqlite-3.40.1-x86_64-1.txz: Upgraded. kde/bluedevil-5.26.5-x86_64-1.txz: Upgraded. kde/breeze-5.26.5-x86_64-1.txz: Upgraded. kde/breeze-grub-5.26.5-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.26.5-x86_64-1.txz: Upgraded. kde/digikam-7.9.0-x86_64-2.txz: Rebuilt. Recompiled against opencv-4.7.0. kde/drkonqi-5.26.5-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.26.5-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.26.5-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.26.5-x86_64-1.txz: Upgraded. kde/kdecoration-5.26.5-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.26.5-x86_64-1.txz: Upgraded. kde/kgamma5-5.26.5-x86_64-1.txz: Upgraded. kde/khotkeys-5.26.5-x86_64-1.txz: Upgraded. kde/kinfocenter-5.26.5-x86_64-1.txz: Upgraded. kde/kmenuedit-5.26.5-x86_64-1.txz: Upgraded. kde/kpipewire-5.26.5-x86_64-1.txz: Upgraded. kde/kscreen-5.26.5-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.26.5-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.26.5-x86_64-1.txz: Upgraded. kde/ksystemstats-5.26.5-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.26.5-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.26.5-x86_64-1.txz: Upgraded. kde/kwin-5.26.5-x86_64-1.txz: Upgraded. kde/kwrited-5.26.5-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.26.5-x86_64-1.txz: Upgraded. kde/libkscreen-5.26.5-x86_64-1.txz: Upgraded. kde/libksysguard-5.26.5-x86_64-1.txz: Upgraded. kde/milou-5.26.5-x86_64-1.txz: Upgraded. kde/oxygen-5.26.5-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-disks-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-integration-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-nm-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-pa-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-vault-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.26.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.26.5-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.26.5-x86_64-1.txz: Upgraded. kde/powerdevil-5.26.5-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.26.5-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.26.5-x86_64-1.txz: Upgraded. kde/systemsettings-5.26.5-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.26.5-x86_64-1.txz: Upgraded. l/SDL2-2.26.2-x86_64-1.txz: Upgraded. l/gst-plugins-bad-free-1.20.5-x86_64-2.txz: Rebuilt. Recompiled against opencv-4.7.0. l/imagemagick-7.1.0_57-x86_64-1.txz: Upgraded. l/libpcap-1.10.2-x86_64-1.txz: Upgraded. l/libpsl-0.21.2-x86_64-1.txz: Upgraded. l/librevenge-0.0.5-x86_64-1.txz: Upgraded. l/libsndfile-1.2.0-x86_64-1.txz: Upgraded. l/libtiff-4.4.0-x86_64-2.txz: Rebuilt. Patched various security bugs. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-2056 https://www.cve.org/CVERecord?id=CVE-2022-2057 https://www.cve.org/CVERecord?id=CVE-2022-2058 https://www.cve.org/CVERecord?id=CVE-2022-3970 https://www.cve.org/CVERecord?id=CVE-2022-34526 (* Security fix *) l/netpbm-11.01.00-x86_64-1.txz: Upgraded. l/opencv-4.7.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/poppler-23.01.0-x86_64-1.txz: Upgraded. n/getmail-6.18.11-x86_64-1.txz: Upgraded. n/tcpdump-4.99.2-x86_64-1.txz: Upgraded. n/whois-5.5.15-x86_64-1.txz: Upgraded. Updated the .bd, .nz and .tv TLD servers. Added the .llyw.cymru, .gov.scot and .gov.wales SLD servers. Updated the .ac.uk and .gov.uk SLD servers. Recursion has been enabled for whois.nic.tv. Updated the list of new gTLDs with four generic TLDs assigned in October 2013 which were missing due to a bug. Removed 4 new gTLDs which are no longer active. Added the Georgian translation, contributed by Temuri Doghonadze. Updated the Finnish translation, contributed by Lauri Nurmi. xap/pidgin-2.14.12-x86_64-1.txz: Upgraded. xap/rxvt-unicode-9.26-x86_64-4.txz: Rebuilt. When the "background" extension was loaded, an attacker able to control the data written to the terminal would be able to execute arbitrary code as the terminal's user. Thanks to David Leadbeater and Ben Collver. For more information, see: https://www.openwall.com/lists/oss-security/2022/12/05/1 https://www.cve.org/CVERecord?id=CVE-2022-4170 (* Security fix *)
This commit is contained in:
parent
356066ad01
commit
b3409a9b21
19 changed files with 2304 additions and 947 deletions
107
ChangeLog.rss
107
ChangeLog.rss
|
@ -11,9 +11,112 @@
|
|||
<description>Tracking Slackware development in git.</description>
|
||||
<language>en-us</language>
|
||||
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
|
||||
<pubDate>Sun, 1 Jan 2023 03:25:48 GMT</pubDate>
|
||||
<lastBuildDate>Sun, 1 Jan 2023 05:39:34 GMT</lastBuildDate>
|
||||
<pubDate>Wed, 4 Jan 2023 02:18:08 GMT</pubDate>
|
||||
<lastBuildDate>Wed, 4 Jan 2023 03:37:56 GMT</lastBuildDate>
|
||||
<generator>maintain_current_git.sh v 1.17</generator>
|
||||
<item>
|
||||
<title>Wed, 4 Jan 2023 02:18:08 GMT</title>
|
||||
<pubDate>Wed, 4 Jan 2023 02:18:08 GMT</pubDate>
|
||||
<link>https://git.slackware.nl/current/tag/?h=20230104021808</link>
|
||||
<guid isPermaLink="false">20230104021808</guid>
|
||||
<description>
|
||||
<![CDATA[<pre>
|
||||
ap/lsof-4.96.5-x86_64-1.txz: Upgraded.
|
||||
ap/sqlite-3.40.1-x86_64-1.txz: Upgraded.
|
||||
kde/bluedevil-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/breeze-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/breeze-grub-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/breeze-gtk-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/digikam-7.9.0-x86_64-2.txz: Rebuilt.
|
||||
Recompiled against opencv-4.7.0.
|
||||
kde/drkonqi-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kactivitymanagerd-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kde-cli-tools-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kde-gtk-config-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kdecoration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kdeplasma-addons-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kgamma5-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/khotkeys-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kinfocenter-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kmenuedit-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kpipewire-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kscreen-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kscreenlocker-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/ksshaskpass-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/ksystemstats-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwallet-pam-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwayland-integration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwin-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwrited-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/layer-shell-qt-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/libkscreen-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/libksysguard-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/milou-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/oxygen-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/oxygen-sounds-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-browser-integration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-desktop-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-disks-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-firewall-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-integration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-nm-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-pa-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-sdk-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-systemmonitor-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-vault-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-workspace-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-workspace-wallpapers-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/polkit-kde-agent-1-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/powerdevil-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/qqc2-breeze-style-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/sddm-kcm-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/systemsettings-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/xdg-desktop-portal-kde-5.26.5-x86_64-1.txz: Upgraded.
|
||||
l/SDL2-2.26.2-x86_64-1.txz: Upgraded.
|
||||
l/gst-plugins-bad-free-1.20.5-x86_64-2.txz: Rebuilt.
|
||||
Recompiled against opencv-4.7.0.
|
||||
l/imagemagick-7.1.0_57-x86_64-1.txz: Upgraded.
|
||||
l/libpcap-1.10.2-x86_64-1.txz: Upgraded.
|
||||
l/libpsl-0.21.2-x86_64-1.txz: Upgraded.
|
||||
l/librevenge-0.0.5-x86_64-1.txz: Upgraded.
|
||||
l/libsndfile-1.2.0-x86_64-1.txz: Upgraded.
|
||||
l/libtiff-4.4.0-x86_64-2.txz: Rebuilt.
|
||||
Patched various security bugs.
|
||||
For more information, see:
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-2056
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-2057
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-2058
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-3970
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-34526
|
||||
(* Security fix *)
|
||||
l/netpbm-11.01.00-x86_64-1.txz: Upgraded.
|
||||
l/opencv-4.7.0-x86_64-1.txz: Upgraded.
|
||||
Shared library .so-version bump.
|
||||
l/poppler-23.01.0-x86_64-1.txz: Upgraded.
|
||||
n/getmail-6.18.11-x86_64-1.txz: Upgraded.
|
||||
n/tcpdump-4.99.2-x86_64-1.txz: Upgraded.
|
||||
n/whois-5.5.15-x86_64-1.txz: Upgraded.
|
||||
Updated the .bd, .nz and .tv TLD servers.
|
||||
Added the .llyw.cymru, .gov.scot and .gov.wales SLD servers.
|
||||
Updated the .ac.uk and .gov.uk SLD servers.
|
||||
Recursion has been enabled for whois.nic.tv.
|
||||
Updated the list of new gTLDs with four generic TLDs assigned in October 2013
|
||||
which were missing due to a bug.
|
||||
Removed 4 new gTLDs which are no longer active.
|
||||
Added the Georgian translation, contributed by Temuri Doghonadze.
|
||||
Updated the Finnish translation, contributed by Lauri Nurmi.
|
||||
xap/pidgin-2.14.12-x86_64-1.txz: Upgraded.
|
||||
xap/rxvt-unicode-9.26-x86_64-4.txz: Rebuilt.
|
||||
When the "background" extension was loaded, an attacker able to control the
|
||||
data written to the terminal would be able to execute arbitrary code as the
|
||||
terminal's user. Thanks to David Leadbeater and Ben Collver.
|
||||
For more information, see:
|
||||
https://www.openwall.com/lists/oss-security/2022/12/05/1
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-4170
|
||||
(* Security fix *)
|
||||
</pre>]]>
|
||||
</description>
|
||||
</item>
|
||||
<item>
|
||||
<title>Sun, 1 Jan 2023 03:25:48 GMT</title>
|
||||
<pubDate>Sun, 1 Jan 2023 03:25:48 GMT</pubDate>
|
||||
|
|
|
@ -1,3 +1,98 @@
|
|||
Wed Jan 4 02:18:08 UTC 2023
|
||||
ap/lsof-4.96.5-x86_64-1.txz: Upgraded.
|
||||
ap/sqlite-3.40.1-x86_64-1.txz: Upgraded.
|
||||
kde/bluedevil-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/breeze-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/breeze-grub-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/breeze-gtk-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/digikam-7.9.0-x86_64-2.txz: Rebuilt.
|
||||
Recompiled against opencv-4.7.0.
|
||||
kde/drkonqi-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kactivitymanagerd-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kde-cli-tools-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kde-gtk-config-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kdecoration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kdeplasma-addons-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kgamma5-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/khotkeys-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kinfocenter-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kmenuedit-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kpipewire-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kscreen-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kscreenlocker-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/ksshaskpass-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/ksystemstats-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwallet-pam-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwayland-integration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwin-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/kwrited-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/layer-shell-qt-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/libkscreen-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/libksysguard-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/milou-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/oxygen-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/oxygen-sounds-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-browser-integration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-desktop-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-disks-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-firewall-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-integration-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-nm-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-pa-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-sdk-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-systemmonitor-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-vault-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-workspace-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/plasma-workspace-wallpapers-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/polkit-kde-agent-1-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/powerdevil-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/qqc2-breeze-style-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/sddm-kcm-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/systemsettings-5.26.5-x86_64-1.txz: Upgraded.
|
||||
kde/xdg-desktop-portal-kde-5.26.5-x86_64-1.txz: Upgraded.
|
||||
l/SDL2-2.26.2-x86_64-1.txz: Upgraded.
|
||||
l/gst-plugins-bad-free-1.20.5-x86_64-2.txz: Rebuilt.
|
||||
Recompiled against opencv-4.7.0.
|
||||
l/imagemagick-7.1.0_57-x86_64-1.txz: Upgraded.
|
||||
l/libpcap-1.10.2-x86_64-1.txz: Upgraded.
|
||||
l/libpsl-0.21.2-x86_64-1.txz: Upgraded.
|
||||
l/librevenge-0.0.5-x86_64-1.txz: Upgraded.
|
||||
l/libsndfile-1.2.0-x86_64-1.txz: Upgraded.
|
||||
l/libtiff-4.4.0-x86_64-2.txz: Rebuilt.
|
||||
Patched various security bugs.
|
||||
For more information, see:
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-2056
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-2057
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-2058
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-3970
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-34526
|
||||
(* Security fix *)
|
||||
l/netpbm-11.01.00-x86_64-1.txz: Upgraded.
|
||||
l/opencv-4.7.0-x86_64-1.txz: Upgraded.
|
||||
Shared library .so-version bump.
|
||||
l/poppler-23.01.0-x86_64-1.txz: Upgraded.
|
||||
n/getmail-6.18.11-x86_64-1.txz: Upgraded.
|
||||
n/tcpdump-4.99.2-x86_64-1.txz: Upgraded.
|
||||
n/whois-5.5.15-x86_64-1.txz: Upgraded.
|
||||
Updated the .bd, .nz and .tv TLD servers.
|
||||
Added the .llyw.cymru, .gov.scot and .gov.wales SLD servers.
|
||||
Updated the .ac.uk and .gov.uk SLD servers.
|
||||
Recursion has been enabled for whois.nic.tv.
|
||||
Updated the list of new gTLDs with four generic TLDs assigned in October 2013
|
||||
which were missing due to a bug.
|
||||
Removed 4 new gTLDs which are no longer active.
|
||||
Added the Georgian translation, contributed by Temuri Doghonadze.
|
||||
Updated the Finnish translation, contributed by Lauri Nurmi.
|
||||
xap/pidgin-2.14.12-x86_64-1.txz: Upgraded.
|
||||
xap/rxvt-unicode-9.26-x86_64-4.txz: Rebuilt.
|
||||
When the "background" extension was loaded, an attacker able to control the
|
||||
data written to the terminal would be able to execute arbitrary code as the
|
||||
terminal's user. Thanks to David Leadbeater and Ben Collver.
|
||||
For more information, see:
|
||||
https://www.openwall.com/lists/oss-security/2022/12/05/1
|
||||
https://www.cve.org/CVERecord?id=CVE-2022-4170
|
||||
(* Security fix *)
|
||||
+--------------------------+
|
||||
Sun Jan 1 03:25:48 UTC 2023
|
||||
Happy New Year! :-)
|
||||
a/dialog-1.3_20221229-x86_64-1.txz: Upgraded.
|
||||
|
|
779
FILELIST.TXT
779
FILELIST.TXT
File diff suppressed because it is too large
Load diff
|
@ -773,7 +773,6 @@ gzip ./source/l/libdbusmenu/libdbusmenu_configure_valgrind.patch
|
|||
gzip ./source/l/QScintilla/QScintilla_qsciscintillabase_qurl.diff
|
||||
gzip ./source/l/gvfs/doinst.sh
|
||||
gzip ./source/l/openjpeg/openjpeg2_remove-thirdparty.patch
|
||||
gzip ./source/l/opencv/0004-Add-missing-header-for-LIBAVCODEC_VERSION_INT.patch
|
||||
gzip ./source/l/libxslt/libxslt.xsltMaxDepth.diff
|
||||
gzip ./source/l/netpbm/netpbm-xwdfix.patch
|
||||
gzip ./source/l/netpbm/netpbm-docfix.patch
|
||||
|
@ -880,6 +879,9 @@ gzip ./source/l/dconf/doinst.sh
|
|||
gzip ./source/l/ebook-tools/epub3_fixed_layout.patch
|
||||
gzip ./source/l/mozilla-nss/CVE-2022-3479.patch
|
||||
gzip ./source/l/libwpd/libwpd.gcc11.diff
|
||||
gzip ./source/l/libtiff/patches/CVE-2022-2056_2057_2058.patch
|
||||
gzip ./source/l/libtiff/patches/CVE-2022-34526.patch
|
||||
gzip ./source/l/libtiff/patches/CVE-2022-3970.patch
|
||||
gzip ./source/l/pygtk/pygtk-Drop-the-PangoFont-find_shaper-virtual-method.patch
|
||||
gzip ./source/l/pygtk/pygtk-fix-pango-object-leaks.patch
|
||||
gzip ./source/l/gnome-keyring/doinst.sh
|
||||
|
@ -999,6 +1001,7 @@ gzip ./source/xap/libnma/doinst.sh
|
|||
gzip ./source/xap/x3270/doinst.sh
|
||||
gzip ./source/xap/xaos/xaos.6
|
||||
gzip ./source/xap/rxvt-unicode/rxvt-unicode.utempter.diff
|
||||
gzip ./source/xap/rxvt-unicode/CVE-2022-4170.diff
|
||||
gzip ./source/xap/gparted/doinst.sh
|
||||
gzip ./source/xap/fvwm/startfvwm2
|
||||
gzip ./source/xap/fvwm/doinst.sh
|
||||
|
|
|
@ -1 +1 @@
|
|||
1
|
||||
2
|
||||
|
|
|
@ -27,7 +27,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=gst-plugins-bad-free
|
||||
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-1}
|
||||
BUILD=${BUILD:-2}
|
||||
|
||||
# Automatically determine the architecture we're building on:
|
||||
if [ -z "$ARCH" ]; then
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
cd $(dirname $0) ; CWD=$(pwd)
|
||||
|
||||
PKGNAM=imagemagick
|
||||
BUILD=${BUILD:-2}
|
||||
BUILD=${BUILD:-1}
|
||||
|
||||
# NOTE: This is to cope with ImageMagick version numbers such as 5.4.7-4,
|
||||
# which occur fairly often (but not always). If these numbers are all the same,
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Copyright 2018, 2020 Patrick J. Volkerding, Sebeka, Minnesota, USA
|
||||
# Copyright 2018, 2020, 2023 Patrick J. Volkerding, Sebeka, Minnesota, USA
|
||||
# All rights reserved.
|
||||
#
|
||||
# Redistribution and use of this script, with or without modification, is
|
||||
|
@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=libpsl
|
||||
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-5}
|
||||
BUILD=${BUILD:-1}
|
||||
|
||||
# Automatically determine the architecture we're building on:
|
||||
if [ -z "$ARCH" ]; then
|
||||
|
@ -105,6 +105,13 @@ if [ ! -r /usr/share/publicsuffix/public_suffix_list.dat ]; then
|
|||
fi
|
||||
|
||||
# Configure, build, and install:
|
||||
if [ ! -r configure ]; then
|
||||
if [ -x ./autogen.sh ]; then
|
||||
NOCONFIGURE=1 ./autogen.sh
|
||||
else
|
||||
autoreconf -vif
|
||||
fi
|
||||
fi
|
||||
CFLAGS="$SLKCFLAGS" \
|
||||
CXXFLAGS="$SLKCFLAGS" \
|
||||
./configure \
|
||||
|
@ -185,4 +192,3 @@ cat $CWD/slack-desc > $PKG/install/slack-desc
|
|||
|
||||
cd $PKG
|
||||
/sbin/makepkg -l y -c n $TMP/$PKGNAM-$VERSION-$ARCH-$BUILD.txz
|
||||
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -25,7 +25,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=librevenge
|
||||
VERSION=${VERSION:-$(echo librevenge-*.tar.?z* | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-4}
|
||||
BUILD=${BUILD:-1}
|
||||
|
||||
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
|
||||
|
||||
|
|
|
@ -28,7 +28,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=libsndfile
|
||||
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-2}
|
||||
BUILD=${BUILD:-1}
|
||||
|
||||
if [ -z "$ARCH" ]; then
|
||||
case "$( uname -m )" in
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Copyright 2004, 2005, 2006, 2009, 2010, 2011, 2012, 2013, 2015, 2018, 2022 Patrick J. Volkerding, Sebeka, Minnesota, USA
|
||||
# Copyright 2004, 2005, 2006, 2009, 2010, 2011, 2012, 2013, 2015, 2018, 2022, 2023 Patrick J. Volkerding, Sebeka, Minnesota, USA
|
||||
# All rights reserved.
|
||||
#
|
||||
# Redistribution and use of this script, with or without modification, is
|
||||
|
@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=libtiff
|
||||
VERSION=${VERSION:-$(echo tiff-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-1}
|
||||
BUILD=${BUILD:-2}
|
||||
|
||||
# Automatically determine the architecture we're building on:
|
||||
if [ -z "$ARCH" ]; then
|
||||
|
|
180
source/l/libtiff/patches/CVE-2022-2056_2057_2058.patch
Normal file
180
source/l/libtiff/patches/CVE-2022-2056_2057_2058.patch
Normal file
|
@ -0,0 +1,180 @@
|
|||
From dd1bcc7abb26094e93636e85520f0d8f81ab0fab Mon Sep 17 00:00:00 2001
|
||||
From: 4ugustus <wangdw.augustus@qq.com>
|
||||
Date: Sat, 11 Jun 2022 09:31:43 +0000
|
||||
Subject: [PATCH] fix the FPE in tiffcrop (#415, #427, and #428)
|
||||
|
||||
---
|
||||
libtiff/tif_aux.c | 9 +++++++
|
||||
libtiff/tiffiop.h | 1 +
|
||||
tools/tiffcrop.c | 62 ++++++++++++++++++++++++++---------------------
|
||||
3 files changed, 44 insertions(+), 28 deletions(-)
|
||||
|
||||
diff --git a/libtiff/tif_aux.c b/libtiff/tif_aux.c
|
||||
index 140f26c7..5b88c8d0 100644
|
||||
--- a/libtiff/tif_aux.c
|
||||
+++ b/libtiff/tif_aux.c
|
||||
@@ -402,6 +402,15 @@ float _TIFFClampDoubleToFloat( double val )
|
||||
return (float)val;
|
||||
}
|
||||
|
||||
+uint32_t _TIFFClampDoubleToUInt32(double val)
|
||||
+{
|
||||
+ if( val < 0 )
|
||||
+ return 0;
|
||||
+ if( val > 0xFFFFFFFFU || val != val )
|
||||
+ return 0xFFFFFFFFU;
|
||||
+ return (uint32_t)val;
|
||||
+}
|
||||
+
|
||||
int _TIFFSeekOK(TIFF* tif, toff_t off)
|
||||
{
|
||||
/* Huge offsets, especially -1 / UINT64_MAX, can cause issues */
|
||||
diff --git a/libtiff/tiffiop.h b/libtiff/tiffiop.h
|
||||
index e3af461d..4e8bdac2 100644
|
||||
--- a/libtiff/tiffiop.h
|
||||
+++ b/libtiff/tiffiop.h
|
||||
@@ -365,6 +365,7 @@ extern double _TIFFUInt64ToDouble(uint64_t);
|
||||
extern float _TIFFUInt64ToFloat(uint64_t);
|
||||
|
||||
extern float _TIFFClampDoubleToFloat(double);
|
||||
+extern uint32_t _TIFFClampDoubleToUInt32(double);
|
||||
|
||||
extern tmsize_t
|
||||
_TIFFReadEncodedStripAndAllocBuffer(TIFF* tif, uint32_t strip,
|
||||
diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c
|
||||
index 1f827b2b..90286a5e 100644
|
||||
--- a/tools/tiffcrop.c
|
||||
+++ b/tools/tiffcrop.c
|
||||
@@ -5268,17 +5268,17 @@ computeInputPixelOffsets(struct crop_mask *crop, struct image_data *image,
|
||||
{
|
||||
if ((crop->res_unit == RESUNIT_INCH) || (crop->res_unit == RESUNIT_CENTIMETER))
|
||||
{
|
||||
- x1 = (uint32_t) (crop->corners[i].X1 * scale * xres);
|
||||
- x2 = (uint32_t) (crop->corners[i].X2 * scale * xres);
|
||||
- y1 = (uint32_t) (crop->corners[i].Y1 * scale * yres);
|
||||
- y2 = (uint32_t) (crop->corners[i].Y2 * scale * yres);
|
||||
+ x1 = _TIFFClampDoubleToUInt32(crop->corners[i].X1 * scale * xres);
|
||||
+ x2 = _TIFFClampDoubleToUInt32(crop->corners[i].X2 * scale * xres);
|
||||
+ y1 = _TIFFClampDoubleToUInt32(crop->corners[i].Y1 * scale * yres);
|
||||
+ y2 = _TIFFClampDoubleToUInt32(crop->corners[i].Y2 * scale * yres);
|
||||
}
|
||||
else
|
||||
{
|
||||
- x1 = (uint32_t) (crop->corners[i].X1);
|
||||
- x2 = (uint32_t) (crop->corners[i].X2);
|
||||
- y1 = (uint32_t) (crop->corners[i].Y1);
|
||||
- y2 = (uint32_t) (crop->corners[i].Y2);
|
||||
+ x1 = _TIFFClampDoubleToUInt32(crop->corners[i].X1);
|
||||
+ x2 = _TIFFClampDoubleToUInt32(crop->corners[i].X2);
|
||||
+ y1 = _TIFFClampDoubleToUInt32(crop->corners[i].Y1);
|
||||
+ y2 = _TIFFClampDoubleToUInt32(crop->corners[i].Y2);
|
||||
}
|
||||
/* a) Region needs to be within image sizes 0.. width-1; 0..length-1
|
||||
* b) Corners are expected to be submitted as top-left to bottom-right.
|
||||
@@ -5357,17 +5357,17 @@ computeInputPixelOffsets(struct crop_mask *crop, struct image_data *image,
|
||||
{
|
||||
if (crop->res_unit != RESUNIT_INCH && crop->res_unit != RESUNIT_CENTIMETER)
|
||||
{ /* User has specified pixels as reference unit */
|
||||
- tmargin = (uint32_t)(crop->margins[0]);
|
||||
- lmargin = (uint32_t)(crop->margins[1]);
|
||||
- bmargin = (uint32_t)(crop->margins[2]);
|
||||
- rmargin = (uint32_t)(crop->margins[3]);
|
||||
+ tmargin = _TIFFClampDoubleToUInt32(crop->margins[0]);
|
||||
+ lmargin = _TIFFClampDoubleToUInt32(crop->margins[1]);
|
||||
+ bmargin = _TIFFClampDoubleToUInt32(crop->margins[2]);
|
||||
+ rmargin = _TIFFClampDoubleToUInt32(crop->margins[3]);
|
||||
}
|
||||
else
|
||||
{ /* inches or centimeters specified */
|
||||
- tmargin = (uint32_t)(crop->margins[0] * scale * yres);
|
||||
- lmargin = (uint32_t)(crop->margins[1] * scale * xres);
|
||||
- bmargin = (uint32_t)(crop->margins[2] * scale * yres);
|
||||
- rmargin = (uint32_t)(crop->margins[3] * scale * xres);
|
||||
+ tmargin = _TIFFClampDoubleToUInt32(crop->margins[0] * scale * yres);
|
||||
+ lmargin = _TIFFClampDoubleToUInt32(crop->margins[1] * scale * xres);
|
||||
+ bmargin = _TIFFClampDoubleToUInt32(crop->margins[2] * scale * yres);
|
||||
+ rmargin = _TIFFClampDoubleToUInt32(crop->margins[3] * scale * xres);
|
||||
}
|
||||
|
||||
if ((lmargin + rmargin) > image->width)
|
||||
@@ -5397,24 +5397,24 @@ computeInputPixelOffsets(struct crop_mask *crop, struct image_data *image,
|
||||
if (crop->res_unit != RESUNIT_INCH && crop->res_unit != RESUNIT_CENTIMETER)
|
||||
{
|
||||
if (crop->crop_mode & CROP_WIDTH)
|
||||
- width = (uint32_t)crop->width;
|
||||
+ width = _TIFFClampDoubleToUInt32(crop->width);
|
||||
else
|
||||
width = image->width - lmargin - rmargin;
|
||||
|
||||
if (crop->crop_mode & CROP_LENGTH)
|
||||
- length = (uint32_t)crop->length;
|
||||
+ length = _TIFFClampDoubleToUInt32(crop->length);
|
||||
else
|
||||
length = image->length - tmargin - bmargin;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (crop->crop_mode & CROP_WIDTH)
|
||||
- width = (uint32_t)(crop->width * scale * image->xres);
|
||||
+ width = _TIFFClampDoubleToUInt32(crop->width * scale * image->xres);
|
||||
else
|
||||
width = image->width - lmargin - rmargin;
|
||||
|
||||
if (crop->crop_mode & CROP_LENGTH)
|
||||
- length = (uint32_t)(crop->length * scale * image->yres);
|
||||
+ length = _TIFFClampDoubleToUInt32(crop->length * scale * image->yres);
|
||||
else
|
||||
length = image->length - tmargin - bmargin;
|
||||
}
|
||||
@@ -5868,13 +5868,13 @@ computeOutputPixelOffsets (struct crop_mask *crop, struct image_data *image,
|
||||
{
|
||||
if (page->res_unit == RESUNIT_INCH || page->res_unit == RESUNIT_CENTIMETER)
|
||||
{ /* inches or centimeters specified */
|
||||
- hmargin = (uint32_t)(page->hmargin * scale * page->hres * ((image->bps + 7) / 8));
|
||||
- vmargin = (uint32_t)(page->vmargin * scale * page->vres * ((image->bps + 7) / 8));
|
||||
+ hmargin = _TIFFClampDoubleToUInt32(page->hmargin * scale * page->hres * ((image->bps + 7) / 8));
|
||||
+ vmargin = _TIFFClampDoubleToUInt32(page->vmargin * scale * page->vres * ((image->bps + 7) / 8));
|
||||
}
|
||||
else
|
||||
{ /* Otherwise user has specified pixels as reference unit */
|
||||
- hmargin = (uint32_t)(page->hmargin * scale * ((image->bps + 7) / 8));
|
||||
- vmargin = (uint32_t)(page->vmargin * scale * ((image->bps + 7) / 8));
|
||||
+ hmargin = _TIFFClampDoubleToUInt32(page->hmargin * scale * ((image->bps + 7) / 8));
|
||||
+ vmargin = _TIFFClampDoubleToUInt32(page->vmargin * scale * ((image->bps + 7) / 8));
|
||||
}
|
||||
|
||||
if ((hmargin * 2.0) > (pwidth * page->hres))
|
||||
@@ -5912,13 +5912,13 @@ computeOutputPixelOffsets (struct crop_mask *crop, struct image_data *image,
|
||||
{
|
||||
if (page->mode & PAGE_MODE_PAPERSIZE )
|
||||
{
|
||||
- owidth = (uint32_t)((pwidth * page->hres) - (hmargin * 2));
|
||||
- olength = (uint32_t)((plength * page->vres) - (vmargin * 2));
|
||||
+ owidth = _TIFFClampDoubleToUInt32((pwidth * page->hres) - (hmargin * 2));
|
||||
+ olength = _TIFFClampDoubleToUInt32((plength * page->vres) - (vmargin * 2));
|
||||
}
|
||||
else
|
||||
{
|
||||
- owidth = (uint32_t)(iwidth - (hmargin * 2 * page->hres));
|
||||
- olength = (uint32_t)(ilength - (vmargin * 2 * page->vres));
|
||||
+ owidth = _TIFFClampDoubleToUInt32(iwidth - (hmargin * 2 * page->hres));
|
||||
+ olength = _TIFFClampDoubleToUInt32(ilength - (vmargin * 2 * page->vres));
|
||||
}
|
||||
}
|
||||
|
||||
@@ -5927,6 +5927,12 @@ computeOutputPixelOffsets (struct crop_mask *crop, struct image_data *image,
|
||||
if (olength > ilength)
|
||||
olength = ilength;
|
||||
|
||||
+ if (owidth == 0 || olength == 0)
|
||||
+ {
|
||||
+ TIFFError("computeOutputPixelOffsets", "Integer overflow when calculating the number of pages");
|
||||
+ exit(EXIT_FAILURE);
|
||||
+ }
|
||||
+
|
||||
/* Compute the number of pages required for Portrait or Landscape */
|
||||
switch (page->orient)
|
||||
{
|
||||
--
|
||||
GitLab
|
||||
|
28
source/l/libtiff/patches/CVE-2022-34526.patch
Normal file
28
source/l/libtiff/patches/CVE-2022-34526.patch
Normal file
|
@ -0,0 +1,28 @@
|
|||
From 275735d0354e39c0ac1dc3c0db2120d6f31d1990 Mon Sep 17 00:00:00 2001
|
||||
From: Even Rouault <even.rouault@spatialys.com>
|
||||
Date: Mon, 27 Jun 2022 16:09:43 +0200
|
||||
Subject: [PATCH] _TIFFCheckFieldIsValidForCodec(): return FALSE when passed a
|
||||
codec-specific tag and the codec is not configured (fixes #433)
|
||||
|
||||
This avoids crashes when querying such tags
|
||||
---
|
||||
libtiff/tif_dirinfo.c | 3 +++
|
||||
1 file changed, 3 insertions(+)
|
||||
|
||||
diff --git a/libtiff/tif_dirinfo.c b/libtiff/tif_dirinfo.c
|
||||
index c30f569b..3371cb5c 100644
|
||||
--- a/libtiff/tif_dirinfo.c
|
||||
+++ b/libtiff/tif_dirinfo.c
|
||||
@@ -1191,6 +1191,9 @@ _TIFFCheckFieldIsValidForCodec(TIFF *tif, ttag_t tag)
|
||||
default:
|
||||
return 1;
|
||||
}
|
||||
+ if( !TIFFIsCODECConfigured(tif->tif_dir.td_compression) ) {
|
||||
+ return 0;
|
||||
+ }
|
||||
/* Check if codec specific tags are allowed for the current
|
||||
* compression scheme (codec) */
|
||||
switch (tif->tif_dir.td_compression) {
|
||||
--
|
||||
GitLab
|
||||
|
38
source/l/libtiff/patches/CVE-2022-3970.patch
Normal file
38
source/l/libtiff/patches/CVE-2022-3970.patch
Normal file
|
@ -0,0 +1,38 @@
|
|||
From 227500897dfb07fb7d27f7aa570050e62617e3be Mon Sep 17 00:00:00 2001
|
||||
From: Even Rouault <even.rouault@spatialys.com>
|
||||
Date: Tue, 8 Nov 2022 15:16:58 +0100
|
||||
Subject: [PATCH] TIFFReadRGBATileExt(): fix (unsigned) integer overflow on
|
||||
strips/tiles > 2 GB
|
||||
|
||||
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
|
||||
---
|
||||
libtiff/tif_getimage.c | 8 ++++----
|
||||
1 file changed, 4 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/libtiff/tif_getimage.c b/libtiff/tif_getimage.c
|
||||
index a4d0c1d6..60b94d8e 100644
|
||||
--- a/libtiff/tif_getimage.c
|
||||
+++ b/libtiff/tif_getimage.c
|
||||
@@ -3016,15 +3016,15 @@ TIFFReadRGBATileExt(TIFF* tif, uint32_t col, uint32_t row, uint32_t * raster, in
|
||||
return( ok );
|
||||
|
||||
for( i_row = 0; i_row < read_ysize; i_row++ ) {
|
||||
- memmove( raster + (tile_ysize - i_row - 1) * tile_xsize,
|
||||
- raster + (read_ysize - i_row - 1) * read_xsize,
|
||||
+ memmove( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize,
|
||||
+ raster + (size_t)(read_ysize - i_row - 1) * read_xsize,
|
||||
read_xsize * sizeof(uint32_t) );
|
||||
- _TIFFmemset( raster + (tile_ysize - i_row - 1) * tile_xsize+read_xsize,
|
||||
+ _TIFFmemset( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize+read_xsize,
|
||||
0, sizeof(uint32_t) * (tile_xsize - read_xsize) );
|
||||
}
|
||||
|
||||
for( i_row = read_ysize; i_row < tile_ysize; i_row++ ) {
|
||||
- _TIFFmemset( raster + (tile_ysize - i_row - 1) * tile_xsize,
|
||||
+ _TIFFmemset( raster + (size_t)(tile_ysize - i_row - 1) * tile_xsize,
|
||||
0, sizeof(uint32_t) * tile_xsize );
|
||||
}
|
||||
|
||||
--
|
||||
GitLab
|
||||
|
|
@ -1,20 +0,0 @@
|
|||
From: Jochen Sprickerhof <jspricke@debian.org>
|
||||
Date: Mon, 8 Aug 2022 21:10:13 +0200
|
||||
Subject: Add missing header for LIBAVCODEC_VERSION_INT
|
||||
|
||||
---
|
||||
modules/videoio/src/ffmpeg_codecs.hpp | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/modules/videoio/src/ffmpeg_codecs.hpp b/modules/videoio/src/ffmpeg_codecs.hpp
|
||||
index 61788e0..faad259 100644
|
||||
--- a/modules/videoio/src/ffmpeg_codecs.hpp
|
||||
+++ b/modules/videoio/src/ffmpeg_codecs.hpp
|
||||
@@ -60,6 +60,7 @@ extern "C" {
|
||||
#include <errno.h>
|
||||
#endif
|
||||
|
||||
+#include <libavcodec/version.h>
|
||||
#include <libavformat/avformat.h>
|
||||
|
||||
#ifdef __cplusplus
|
|
@ -1,7 +1,7 @@
|
|||
#!/bin/bash
|
||||
|
||||
# Copyright 2015, 2017, 2019 Eric Hameleers, Eindhoven, NL
|
||||
# Copyright 2020 Patrick J. Volkerding, Sebeka, Minnesota, USA
|
||||
# Copyright 2020, 2023 Patrick J. Volkerding, Sebeka, Minnesota, USA
|
||||
# All rights reserved.
|
||||
#
|
||||
# Redistribution and use of this script, with or without modification, is
|
||||
|
@ -25,7 +25,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=opencv
|
||||
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-2}
|
||||
BUILD=${BUILD:-1}
|
||||
|
||||
# Automatically determine the architecture we're building on:
|
||||
if [ -z "$ARCH" ]; then
|
||||
|
@ -88,8 +88,6 @@ find . \
|
|||
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
|
||||
-exec chmod 644 {} \+
|
||||
|
||||
zcat $CWD/0004-Add-missing-header-for-LIBAVCODEC_VERSION_INT.patch.gz | patch -p1 --verbose || exit 1
|
||||
|
||||
# Configure, build, and install:
|
||||
mkdir cmake-build
|
||||
cd cmake-build
|
||||
|
|
12
source/xap/rxvt-unicode/CVE-2022-4170.diff
Normal file
12
source/xap/rxvt-unicode/CVE-2022-4170.diff
Normal file
|
@ -0,0 +1,12 @@
|
|||
--- ./src/perl/background.orig 2021-05-09 10:04:44.000000000 -0500
|
||||
+++ ./src/perl/background 2023-01-03 13:53:59.865031717 -0600
|
||||
@@ -1451,8 +1451,7 @@
|
||||
# any code execution or other shenanigans. does not
|
||||
# support binary NULs in string.
|
||||
sub q0 {
|
||||
- (my $str = shift) =~ s/\x00//g; # make sure there really aren't any embedded NULs
|
||||
- "q\x00$str\x00"
|
||||
+ "qq\x00\Q$_[0]\E\x00"
|
||||
}
|
||||
|
||||
sub old_bg_expr {
|
|
@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
|
|||
|
||||
PKGNAM=rxvt-unicode
|
||||
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
|
||||
BUILD=${BUILD:-3}
|
||||
BUILD=${BUILD:-4}
|
||||
|
||||
# Automatically determine the architecture we're building on:
|
||||
if [ -z "$ARCH" ]; then
|
||||
|
@ -88,6 +88,9 @@ find . \
|
|||
# Add support for utempter:
|
||||
zcat $CWD/rxvt-unicode.utempter.diff.gz | patch -p1 --verbose || exit 1
|
||||
|
||||
# Security fix:
|
||||
zcat $CWD/CVE-2022-4170.diff.gz | patch -p1 --verbose || exit 1
|
||||
|
||||
# Regenerate configure from configure.ac after patching in utempter support:
|
||||
autoreconf -vif
|
||||
|
||||
|
|
Loading…
Reference in a new issue