rpms/staging-kmod-addons/devel .cvsignore, 1.5, 1.6 sources, 1.5, 1.6 staging-kmod-addons.spec, 1.6, 1.7
by Thorsten Leemhuis
Author: thl
Update of /cvs/free/rpms/staging-kmod-addons/devel
In directory se02.es.rpmfusion.net:/tmp/cvs-serv27570/devel
Modified Files:
.cvsignore sources staging-kmod-addons.spec
Log Message:
sync F-16 to devel, F-17 and F-15
Index: .cvsignore
===================================================================
RCS file: /cvs/free/rpms/staging-kmod-addons/devel/.cvsignore,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- .cvsignore 6 Nov 2011 11:33:56 -0000 1.5
+++ .cvsignore 4 Apr 2012 16:17:46 -0000 1.6
@@ -1 +1 @@
-linux-staging-3.1.tar.bz2
+linux-staging-3.3.tar.bz2
Index: sources
===================================================================
RCS file: /cvs/free/rpms/staging-kmod-addons/devel/sources,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- sources 6 Nov 2011 11:33:56 -0000 1.5
+++ sources 4 Apr 2012 16:17:46 -0000 1.6
@@ -1 +1 @@
-20d4d99f2db296b376243621a25c02df linux-staging-3.1.tar.bz2
+7080bd32b25b30a6c57694d846e6cecc linux-staging-3.3.tar.bz2
Index: staging-kmod-addons.spec
===================================================================
RCS file: /cvs/free/rpms/staging-kmod-addons/devel/staging-kmod-addons.spec,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- staging-kmod-addons.spec 6 Nov 2011 11:33:56 -0000 1.6
+++ staging-kmod-addons.spec 4 Apr 2012 16:17:46 -0000 1.7
@@ -1,11 +1,12 @@
# drivers that we ship; to be synced with staging-kmod.spec
-%global stgdrvs ASUS_OLED ATH6K_LEGACY BATMAN_ADV BRCMSMAC BRCMFMAC BCM_WIMAX DRM_PSB EASYCAP ECHO EPL ET131X FB_UDL FB_XGI FT1000_USB HECI HYPERV IDE_PHISON INTEL_MEI LINE6_USB RTS_PSTOR RAMZSWAP R8187SE R8712U RTL8192SU RTL8192E RTL8192U SBE_2T3E3 SLICOSS SOLO6X10 TOUCHSCREEN_CLEARPAD_TM1217 TOUCHSCREEN_SYNAPTICS_I2C_RMI4 USB_ENESTORAGE W35UND PRISM2_USB VT6655 VT6656 XVMALLOC ZRAM ZCACHE
+%global stgdrvs ASUS_OLED BCM_WIMAX EASYCAP ECHO EPL ET131X FB_UDL FB_XGI FT1000_USB HECI IDE_PHISON INTEL_MEI LINE6_USB RTS_PSTOR RAMZSWAP R8187SE R8712U RTL8192SU RTL8192E RTL8192U RTS5139 SLICOSS SOLO6X10 TOUCHSCREEN_CLEARPAD_TM1217 TOUCHSCREEN_SYNAPTICS_I2C_RMI4 USB_ENESTORAGE W35UND PRISM2_USB VT6655 VT6656 XVMALLOC ZRAM ZCACHE
+
# makes handling for rc kernels a whole lot easier:
#global prever rc8
Name: staging-kmod-addons
-Version: 3.1
+Version: 3.3
Release: %{?prever:0.}1%{?prever:.%{prever}}%{?dist}
Summary: Documentation and shared parts for the kmod-staging packages
@@ -58,6 +59,15 @@
%changelog
+* Wed Mar 21 2012 Thorsten Leemhuis <fedora [AT] leemhuis [DOT] info> - 3.3-1
+- update to 3.3
+
+* Tue Jan 24 2012 Thorsten Leemhuis <fedora [AT] leemhuis [DOT] info> - 3.2.1-1.1
+- update to 3.2.1
+- drop ATH6K_LEGACY (replaced by a proper driver)
+- drop DRM_PSB (enabled in Fedora)
+- add RTS5139
+
* Sun Nov 06 2011 Thorsten Leemhuis <fedora [AT] leemhuis [DOT] info> - 3.1-1
- update to 3.1 (no new drivers)
12 years, 7 months
rpms/freetype-freeworld/F-15 freetype-2.4.4-CVE-2012-1126.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1127.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1128.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1130.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1131.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1132.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1133.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1134.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1135.patch, NONE, 1.1 freetype-2.4.4-CVE-2012-1136.patch, NONE, 1.1 freetype-2.4.4-CVE-2012
by Kevin Kofler
Author: kkofler
Update of /cvs/free/rpms/freetype-freeworld/F-15
In directory se02.es.rpmfusion.net:/tmp/cvs-serv23773/F-15
Modified Files:
freetype-freeworld.spec
Added Files:
freetype-2.4.4-CVE-2012-1126.patch
freetype-2.4.4-CVE-2012-1127.patch
freetype-2.4.4-CVE-2012-1128.patch
freetype-2.4.4-CVE-2012-1130.patch
freetype-2.4.4-CVE-2012-1131.patch
freetype-2.4.4-CVE-2012-1132.patch
freetype-2.4.4-CVE-2012-1133.patch
freetype-2.4.4-CVE-2012-1134.patch
freetype-2.4.4-CVE-2012-1135.patch
freetype-2.4.4-CVE-2012-1136.patch
freetype-2.4.4-CVE-2012-1137.patch
freetype-2.4.4-CVE-2012-1138.patch
freetype-2.4.4-CVE-2012-1139.patch
freetype-2.4.4-CVE-2012-1140.patch
freetype-2.4.4-CVE-2012-1141.patch
freetype-2.4.4-CVE-2012-1142.patch
freetype-2.4.4-CVE-2012-1143.patch
freetype-2.4.4-CVE-2012-1144.patch
freetype-2.4.4-bdf-overflow.patch
Log Message:
* Wed Apr 04 2012 Kevin Kofler <Kevin(a)tigcc.ticalc.org> 2.4.4-7
- Add security patches from Fedora freetype-2.4.4-8 (rh#806270)
freetype-2.4.4-CVE-2012-1126.patch:
bdflib.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1126.patch ---
--- a/src/bdf/bdflib.c
+++ b/src/bdf/bdflib.c
@@ -1,6 +1,6 @@
/*
* Copyright 2000 Computing Research Labs, New Mexico State University
- * Copyright 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010
+ * Copyright 2001-2012
* Francesco Zappa Nardelli
*
* Permission is hereby granted, free of charge, to any person obtaining a
@@ -1254,7 +1254,8 @@
ep = line + linelen;
/* Trim the leading whitespace if it exists. */
- *sp++ = 0;
+ if ( *sp )
+ *sp++ = 0;
while ( *sp &&
( *sp == ' ' || *sp == '\t' ) )
sp++;
freetype-2.4.4-CVE-2012-1127.patch:
bdflib.c | 16 +++++++++++++++-
1 file changed, 15 insertions(+), 1 deletion(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1127.patch ---
--- a/src/bdf/bdflib.c
+++ b/src/bdf/bdflib.c
@@ -188,6 +188,7 @@
#define ACMSG13 "Glyph %ld extra rows removed.\n"
#define ACMSG14 "Glyph %ld extra columns removed.\n"
#define ACMSG15 "Incorrect glyph count: %ld indicated but %ld found.\n"
+#define ACMSG16 "Glyph %ld missing columns padded with zero bits.\n"
/* Error messages. */
#define ERRMSG1 "[line %ld] Missing \"%s\" line.\n"
@@ -1725,18 +1726,31 @@
for ( i = 0; i < nibbles; i++ )
{
c = line[i];
+ if ( !c )
+ break;
*bp = (FT_Byte)( ( *bp << 4 ) + a2i[c] );
if ( i + 1 < nibbles && ( i & 1 ) )
*++bp = 0;
}
+ /* If any line has not enough columns, */
+ /* indicate they have been padded with zero bits. */
+ if ( i < nibbles &&
+ !( p->flags & _BDF_GLYPH_WIDTH_CHECK ) )
+ {
+ FT_TRACE2(( "_bdf_parse_glyphs: " ACMSG16, glyph->encoding ));
+ p->flags |= _BDF_GLYPH_WIDTH_CHECK;
+ font->modified = 1;
+ }
+
/* Remove possible garbage at the right. */
mask_index = ( glyph->bbx.width * p->font->bpp ) & 7;
if ( glyph->bbx.width )
*bp &= nibble_mask[mask_index];
/* If any line has extra columns, indicate they have been removed. */
- if ( ( line[nibbles] == '0' || a2i[(int)line[nibbles]] != 0 ) &&
+ if ( i == nibbles &&
+ ( line[nibbles] == '0' || a2i[(int)line[nibbles]] != 0 ) &&
!( p->flags & _BDF_GLYPH_WIDTH_CHECK ) )
{
FT_TRACE2(( "_bdf_parse_glyphs: " ACMSG14, glyph->encoding ));
freetype-2.4.4-CVE-2012-1128.patch:
ttinterp.c | 21 ++++++---------------
1 file changed, 6 insertions(+), 15 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1128.patch ---
--- freetype-2.4.6/src/truetype/ttinterp.c 2011-01-31 21:45:29.000000000 +0100
+++ freetype-2.4.6/src/truetype/ttinterp.c 2012-03-28 13:07:28.000000000 +0200
@@ -5788,7 +5788,7 @@
FT_F26Dot6 dx,
dy;
- FT_UShort last_point, i;
+ FT_UShort limit, i;
if ( BOUNDS( args[0], 2 ) )
@@ -5805,24 +5805,15 @@
/* Twilight zone has no contours, so use `n_points'. */
/* Normal zone's `n_points' includes phantoms, so must */
/* use end of last contour. */
- if ( CUR.GS.gep2 == 0 && CUR.zp2.n_points > 0 )
- last_point = (FT_UShort)( CUR.zp2.n_points - 1 );
+ if ( CUR.GS.gep2 == 0 )
+ limit = (FT_UShort)CUR.zp2.n_points;
else if ( CUR.GS.gep2 == 1 && CUR.zp2.n_contours > 0 )
- {
- last_point = (FT_UShort)( CUR.zp2.contours[CUR.zp2.n_contours - 1] );
-
- if ( BOUNDS( last_point, CUR.zp2.n_points ) )
- {
- if ( CUR.pedantic_hinting )
- CUR.error = TT_Err_Invalid_Reference;
- return;
- }
- }
+ limit = (FT_UShort)( CUR.zp2.contours[CUR.zp2.n_contours - 1] + 1 );
else
- last_point = 0;
+ limit = 0;
/* XXX: UNDOCUMENTED! SHZ doesn't touch the points */
- for ( i = 0; i <= last_point; i++ )
+ for ( i = 0; i < limit; i++ )
{
if ( zp.cur != CUR.zp2.cur || refp != i )
MOVE_Zp2_Point( i, dx, dy, FALSE );
freetype-2.4.4-CVE-2012-1130.patch:
pcfread.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1130.patch ---
--- a/src/pcf/pcfread.c
+++ b/src/pcf/pcfread.c
@@ -2,8 +2,7 @@
FreeType font driver for pcf fonts
- Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
- 2010 by
+ Copyright 2000-2010, 2012 by
Francesco Zappa Nardelli
Permission is hereby granted, free of charge, to any person obtaining a copy
@@ -496,7 +495,8 @@ THE SOFTWARE.
goto Bail;
}
- if ( FT_NEW_ARRAY( strings, string_size ) )
+ /* allocate one more byte so that we have a final null byte */
+ if ( FT_NEW_ARRAY( strings, string_size + 1 ) )
goto Bail;
error = FT_Stream_Read( stream, (FT_Byte*)strings, string_size );
freetype-2.4.4-CVE-2012-1131.patch:
ftsmooth.c | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1131.patch ---
--- freetype-2.4.4/src/smooth/ftsmooth.c 2010-08-10 02:47:47.000000000 +0200
+++ freetype-2.4.4/src/smooth/ftsmooth.c 2012-03-28 15:21:42.000000000 +0200
@@ -4,7 +4,7 @@
/* */
/* Anti-aliasing renderer interface (body). */
/* */
-/* Copyright 2000-2001, 2002, 2003, 2004, 2005, 2006, 2009, 2010 by */
+/* Copyright 2000-2006, 2009-2012 by */
/* David Turner, Robert Wilhelm, and Werner Lemberg. */
/* */
/* This file is part of the FreeType project, and may only be used, */
@@ -105,7 +105,7 @@
FT_Error error;
FT_Outline* outline = NULL;
FT_BBox cbox;
- FT_UInt width, height, height_org, width_org, pitch;
+ FT_Pos width, height, height_org, width_org, pitch;
FT_Bitmap* bitmap;
FT_Memory memory;
FT_Int hmul = mode == FT_RENDER_MODE_LCD;
@@ -148,7 +148,7 @@
return Smooth_Err_Raster_Overflow;
}
else
- width = (FT_UInt)( ( cbox.xMax - cbox.xMin ) >> 6 );
+ width = ( cbox.xMax - cbox.xMin ) >> 6;
if ( cbox.yMin < 0 && cbox.yMax > FT_INT_MAX + cbox.yMin )
{
@@ -158,7 +158,7 @@
return Smooth_Err_Raster_Overflow;
}
else
- height = (FT_UInt)( ( cbox.yMax - cbox.yMin ) >> 6 );
+ height = ( cbox.yMax - cbox.yMin ) >> 6;
bitmap = &slot->bitmap;
memory = render->root.memory;
@@ -218,7 +218,7 @@
/* Required check is ( pitch * height < FT_ULONG_MAX ), */
/* but we care realistic cases only. Always pitch <= width. */
- if ( width > 0x7FFFU || height > 0x7FFFU )
+ if ( width > 0x7FFF || height > 0x7FFF )
{
FT_ERROR(( "ft_smooth_render_generic: glyph too large: %u x %u\n",
width, height ));
freetype-2.4.4-CVE-2012-1132.patch:
psaux/psobjs.c | 5 ++---
type1/t1load.c | 39 ++++++++++++++++++++++++++-------------
2 files changed, 28 insertions(+), 16 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1132.patch ---
--- freetype-2.4.4/src/psaux/psobjs.c 2010-06-20 16:24:14.000000000 +0200
+++ freetype-2.4.4/src/psaux/psobjs.c 2012-03-30 15:28:11.000000000 +0200
@@ -4,8 +4,7 @@
/* */
/* Auxiliary functions for PostScript fonts (body). */
/* */
-/* Copyright 1996-2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, */
-/* 2010 by */
+/* Copyright 1996-2012 by */
/* David Turner, Robert Wilhelm, and Werner Lemberg. */
/* */
/* This file is part of the FreeType project, and may only be used, */
@@ -590,7 +589,7 @@
}
Exit:
- if ( cur == parser->cursor )
+ if ( cur < limit && cur == parser->cursor )
{
FT_ERROR(( "ps_parser_skip_PS_token:"
" current token is `%c' which is self-delimiting\n"
--- freetype-2.4.4/src/type1/t1load.c 2010-11-18 10:36:26.000000000 +0100
+++ freetype-2.4.4/src/type1/t1load.c 2012-03-30 15:28:57.000000000 +0200
@@ -72,6 +72,13 @@
#include "t1errors.h"
+#ifdef FT_CONFIG_OPTION_INCREMENTAL
+#define IS_INCREMENTAL ( face->root.internal->incremental_interface != 0 )
+#else
+#define IS_INCREMENTAL 0
+#endif
+
+
/*************************************************************************/
/* */
/* The macro FT_COMPONENT is used in trace mode. It is an implicit */
@@ -1028,7 +1035,8 @@
static int
read_binary_data( T1_Parser parser,
FT_Long* size,
- FT_Byte** base )
+ FT_Byte** base,
+ FT_Bool incremental )
{
FT_Byte* cur;
FT_Byte* limit = parser->root.limit;
@@ -1063,8 +1071,12 @@
}
}
- FT_ERROR(( "read_binary_data: invalid size field\n" ));
- parser->root.error = T1_Err_Invalid_File_Format;
+ if( !incremental )
+ {
+ FT_ERROR(( "read_binary_data: invalid size field\n" ));
+ parser->root.error = T1_Err_Invalid_File_Format;
+ }
+
return 0;
}
@@ -1385,15 +1397,17 @@
FT_Byte* base;
- /* If the next token isn't `dup' we are done. */
- if ( ft_strncmp( (char*)parser->root.cursor, "dup", 3 ) != 0 )
+ /* If we are out of data, or if the next token isn't `dup', */
+ /* we are done. */
+ if ( parser->root.cursor + 4 >= parser->root.limit ||
+ ft_strncmp( (char*)parser->root.cursor, "dup", 3 ) != 0 )
break;
T1_Skip_PS_Token( parser ); /* `dup' */
idx = T1_ToInt( parser );
- if ( !read_binary_data( parser, &size, &base ) )
+ if ( !read_binary_data( parser, &size, &base, IS_INCREMENTAL ) )
return;
/* The binary string is followed by one token, e.g. `NP' */
@@ -1405,7 +1419,8 @@
return;
T1_Skip_Spaces ( parser );
- if ( ft_strncmp( (char*)parser->root.cursor, "put", 3 ) == 0 )
+ if ( parser->root.cursor + 4 < parser->root.limit &&
+ ft_strncmp( (char*)parser->root.cursor, "put", 3 ) == 0 )
{
T1_Skip_PS_Token( parser ); /* skip `put' */
T1_Skip_Spaces ( parser );
@@ -1578,7 +1593,7 @@
cur++; /* skip `/' */
len = parser->root.cursor - cur;
- if ( !read_binary_data( parser, &size, &base ) )
+ if ( !read_binary_data( parser, &size, &base, IS_INCREMENTAL ) )
return;
/* for some non-standard fonts like `Optima' which provides */
@@ -1867,7 +1882,7 @@
parser->root.cursor = start_binary;
- if ( !read_binary_data( parser, &s, &b ) )
+ if ( !read_binary_data( parser, &s, &b, IS_INCREMENTAL ) )
return T1_Err_Invalid_File_Format;
have_integer = 0;
}
@@ -1880,7 +1895,7 @@
parser->root.cursor = start_binary;
- if ( !read_binary_data( parser, &s, &b ) )
+ if ( !read_binary_data( parser, &s, &b, IS_INCREMENTAL ) )
return T1_Err_Invalid_File_Format;
have_integer = 0;
}
@@ -2154,9 +2169,7 @@
type1->subrs_len = loader.subrs.lengths;
}
-#ifdef FT_CONFIG_OPTION_INCREMENTAL
- if ( !face->root.internal->incremental_interface )
-#endif
+ if ( !IS_INCREMENTAL )
if ( !loader.charstrings.init )
{
FT_ERROR(( "T1_Open_Face: no `/CharStrings' array in face\n" ));
freetype-2.4.4-CVE-2012-1133.patch:
bdflib.c | 5 +++++
1 file changed, 5 insertions(+)
--- NEW FILE freetype-2.4.4-CVE-2012-1133.patch ---
--- freetype-2.4.4/src/bdf/bdflib.c 2012-03-28 15:24:32.000000000 +0200
+++ freetype-2.4.4/src/bdf/bdflib.c 2012-03-28 15:25:18.000000000 +0200
@@ -1587,6 +1587,11 @@
p->glyph_enc = _bdf_atol( p->list.field[1], 0, 10 );
+ /* Normalize negative encoding values. The specification only */
+ /* allows -1, but we can be more generous here. */
+ if ( p->glyph_enc < -1 )
+ p->glyph_enc = -1;
+
/* Check that the encoding is in the range [0,65536] because */
/* otherwise p->have (a bitmap with static size) overflows. */
if ( (size_t)p->glyph_enc >= sizeof ( p->have ) * 8 )
freetype-2.4.4-CVE-2012-1134.patch:
t1parse.c | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1134.patch ---
--- a/src/type1/t1parse.c
+++ b/src/type1/t1parse.c
@@ -4,7 +4,7 @@
/* */
/* Type 1 parser (body). */
/* */
-/* Copyright 1996-2001, 2002, 2003, 2004, 2005, 2008, 2009 by */
+/* Copyright 1996-2005, 2008, 2009, 2012 by */
/* David Turner, Robert Wilhelm, and Werner Lemberg. */
/* */
/* This file is part of the FreeType project, and may only be used, */
@@ -467,6 +467,14 @@
/* we now decrypt the encoded binary private dictionary */
psaux->t1_decrypt( parser->private_dict, parser->private_len, 55665U );
+ if ( parser->private_len < 4 )
+ {
+ FT_ERROR(( "T1_Get_Private_Dict:"
+ " invalid private dictionary section\n" ));
+ error = T1_Err_Invalid_File_Format;
+ goto Fail;
+ }
+
/* replace the four random bytes at the beginning with whitespace */
parser->private_dict[0] = ' ';
parser->private_dict[1] = ' ';
freetype-2.4.4-CVE-2012-1135.patch:
ttinterp.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1135.patch ---
--- a/src/truetype/ttinterp.c
+++ b/src/truetype/ttinterp.c
@@ -4477,7 +4477,7 @@
CUR.length = opcode_length[CUR.opcode];
if ( CUR.length < 0 )
{
- if ( CUR.IP + 1 > CUR.codeSize )
+ if ( CUR.IP + 1 >= CUR.codeSize )
goto Fail_Overflow;
CUR.length = 2 - CUR.length * CUR.code[CUR.IP + 1];
}
@@ -7544,7 +7544,7 @@
if ( ( CUR.length = opcode_length[CUR.opcode] ) < 0 )
{
- if ( CUR.IP + 1 > CUR.codeSize )
+ if ( CUR.IP + 1 >= CUR.codeSize )
goto LErrorCodeOverflow_;
CUR.length = 2 - CUR.length * CUR.code[CUR.IP + 1];
freetype-2.4.4-CVE-2012-1136.patch:
bdflib.c | 19 +++++++++++++------
1 file changed, 13 insertions(+), 6 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1136.patch ---
--- freetype-2.4.6/src/bdf/bdflib.c 2012-03-28 13:13:24.000000000 +0200
+++ freetype-2.4.6/src/bdf/bdflib.c 2012-03-28 13:15:33.000000000 +0200
@@ -1749,12 +1749,7 @@
if ( ft_memcmp( line, "SWIDTH", 6 ) == 0 )
{
if ( !( p->flags & _BDF_ENCODING ) )
- {
- /* Missing ENCODING field. */
- FT_ERROR(( "_bdf_parse_glyphs: " ERRMSG1, lineno, "ENCODING" ));
- error = BDF_Err_Missing_Encoding_Field;
- goto Exit;
- }
+ goto Missing_Encoding;
error = _bdf_list_split( &p->list, (char *)" +", line, linelen );
if ( error )
@@ -1769,6 +1764,9 @@
/* Expect the DWIDTH (scalable width) field next. */
if ( ft_memcmp( line, "DWIDTH", 6 ) == 0 )
{
+ if ( !( p->flags & _BDF_ENCODING ) )
+ goto Missing_Encoding;
+
error = _bdf_list_split( &p->list, (char *)" +", line, linelen );
if ( error )
goto Exit;
@@ -1794,6 +1792,9 @@
/* Expect the BBX field next. */
if ( ft_memcmp( line, "BBX", 3 ) == 0 )
{
+ if ( !( p->flags & _BDF_ENCODING ) )
+ goto Missing_Encoding;
+
error = _bdf_list_split( &p->list, (char *)" +", line, linelen );
if ( error )
goto Exit;
@@ -1893,6 +1894,12 @@
}
error = BDF_Err_Invalid_File_Format;
+ goto Exit;
+
+ Missing_Encoding:
+ /* Missing ENCODING field. */
+ FT_ERROR(( "_bdf_parse_glyphs: " ERRMSG1, lineno, "ENCODING" ));
+ error = BDF_Err_Missing_Encoding_Field;
Exit:
if ( error && ( p->flags & _BDF_GLYPH ) )
freetype-2.4.4-CVE-2012-1137.patch:
bdflib.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1137.patch ---
--- a/src/bdf/bdflib.c
+++ b/src/bdf/bdflib.c
@@ -462,7 +462,7 @@
if ( num_items > list->size )
{
unsigned long oldsize = list->size; /* same as _bdf_list_t.size */
- unsigned long newsize = oldsize + ( oldsize >> 1 ) + 4;
+ unsigned long newsize = oldsize + ( oldsize >> 1 ) + 5;
unsigned long bigsize = (unsigned long)( FT_INT_MAX / sizeof ( char* ) );
FT_Memory memory = list->memory;
freetype-2.4.4-CVE-2012-1138.patch:
ttinterp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1138.patch ---
--- freetype-2.4.6/src/truetype/ttinterp.c 2012-03-28 13:16:19.000000000 +0200
+++ freetype-2.4.6/src/truetype/ttinterp.c 2012-03-28 13:19:39.000000000 +0200
@@ -6223,7 +6223,7 @@
TT_MulFix14( (FT_UInt32)cvt_dist,
CUR.GS.freeVector.y );
- CUR.zp1.cur[point] = CUR.zp0.cur[point];
+ CUR.zp1.cur[point] = CUR.zp1.org[point];
}
org_dist = CUR_Func_dualproj( &CUR.zp1.org[point],
freetype-2.4.4-CVE-2012-1139.patch:
bdflib.c | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1139.patch ---
--- freetype-2.4.6/src/bdf/bdflib.c 2012-03-28 13:24:22.000000000 +0200
+++ freetype-2.4.6/src/bdf/bdflib.c 2012-03-28 13:24:22.000000000 +0200
@@ -791,7 +791,7 @@
};
-#define isdigok( m, d ) (m[(d) >> 3] & ( 1 << ( (d) & 7 ) ) )
+#define isdigok( m, d ) (m[(unsigned char)(d) >> 3] & ( 1 << ( (d) & 7 ) ) )
/* Routine to convert an ASCII string into an unsigned long integer. */
@@ -1709,7 +1709,7 @@
for ( i = 0; i < nibbles; i++ )
{
c = line[i];
- if ( !c )
+ if ( !isdigok( hdigits, c ) )
break;
*bp = (FT_Byte)( ( *bp << 4 ) + a2i[c] );
if ( i + 1 < nibbles && ( i & 1 ) )
@@ -1732,9 +1732,9 @@
*bp &= nibble_mask[mask_index];
/* If any line has extra columns, indicate they have been removed. */
- if ( i == nibbles &&
- ( line[nibbles] == '0' || a2i[(int)line[nibbles]] != 0 ) &&
- !( p->flags & _BDF_GLYPH_WIDTH_CHECK ) )
+ if ( i == nibbles &&
+ isdigok( hdigits, line[nibbles] ) &&
+ !( p->flags & _BDF_GLYPH_WIDTH_CHECK ) )
{
FT_TRACE2(( "_bdf_parse_glyphs: " ACMSG14, glyph->encoding ));
p->flags |= _BDF_GLYPH_WIDTH_CHECK;
freetype-2.4.4-CVE-2012-1140.patch:
psconv.c | 16 ++++++++++++----
1 file changed, 12 insertions(+), 4 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1140.patch ---
--- a/src/psaux/psconv.c
+++ b/src/psaux/psconv.c
@@ -4,7 +4,7 @@
/* */
/* Some convenience conversions (body). */
/* */
-/* Copyright 2006, 2008, 2009 by */
+/* Copyright 2006, 2008, 2009, 2012 by */
/* David Turner, Robert Wilhelm, and Werner Lemberg. */
/* */
/* This file is part of the FreeType project, and may only be used, */
@@ -79,7 +79,7 @@
FT_Bool sign = 0;
- if ( p == limit || base < 2 || base > 36 )
+ if ( p >= limit || base < 2 || base > 36 )
return 0;
if ( *p == '-' || *p == '+' )
@@ -150,7 +150,7 @@
FT_Bool sign = 0;
- if ( p == limit )
+ if ( p >= limit )
return 0;
if ( *p == '-' || *p == '+' )
@@ -346,7 +346,11 @@
#if 1
- p = *cursor;
+ p = *cursor;
+
+ if ( p >= limit )
+ return 0;
+
if ( n > (FT_UInt)( limit - p ) )
n = (FT_UInt)( limit - p );
@@ -434,6 +438,10 @@
#if 1
p = *cursor;
+
+ if ( p >= limit )
+ return 0;
+
if ( n > (FT_UInt)(limit - p) )
n = (FT_UInt)(limit - p);
freetype-2.4.4-CVE-2012-1141.patch:
bdflib.c | 8 ++++++++
1 file changed, 8 insertions(+)
--- NEW FILE freetype-2.4.4-CVE-2012-1141.patch ---
--- freetype-2.4.6/src/bdf/bdflib.c 2012-03-28 13:25:37.000000000 +0200
+++ freetype-2.4.6/src/bdf/bdflib.c 2012-03-28 13:25:37.000000000 +0200
@@ -521,6 +521,14 @@
/* Initialize the list. */
list->used = 0;
+ if ( list->size )
+ {
+ list->field[0] = (char*)empty;
+ list->field[1] = (char*)empty;
+ list->field[2] = (char*)empty;
+ list->field[3] = (char*)empty;
+ list->field[4] = (char*)empty;
+ }
/* If the line is empty, then simply return. */
if ( linelen == 0 || line[0] == 0 )
freetype-2.4.4-CVE-2012-1142.patch:
winfnt.c | 11 +++++++++--
1 file changed, 9 insertions(+), 2 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1142.patch ---
--- freetype-2.4.6/src/winfonts/winfnt.c 2010-09-11 08:06:45.000000000 +0200
+++ freetype-2.4.6/src/winfonts/winfnt.c 2012-03-28 13:21:18.000000000 +0200
@@ -4,7 +4,7 @@
/* */
/* FreeType font driver for Windows FNT/FON files */
/* */
-/* Copyright 1996-2001, 2002, 2003, 2004, 2006, 2007, 2008, 2009, 2010 by */
+/* Copyright 1996-2004, 2006-2012 by */
/* David Turner, Robert Wilhelm, and Werner Lemberg. */
/* Copyright 2003 Huw D M Davies for Codeweavers */
/* Copyright 2007 Dmitry Timoshkov for Codeweavers */
@@ -827,7 +827,14 @@
root->charmap = root->charmaps[0];
}
- /* setup remaining flags */
+ /* set up remaining flags */
+
+ if ( font->header.last_char < font->header.first_char )
+ {
+ FT_TRACE2(( "invalid number of glyphs\n" ));
+ error = FNT_Err_Invalid_File_Format;
+ goto Fail;
+ }
/* reserve one slot for the .notdef glyph at index 0 */
root->num_glyphs = font->header.last_char -
freetype-2.4.4-CVE-2012-1143.patch:
ftcalc.c | 17 +++++++++--------
1 file changed, 9 insertions(+), 8 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1143.patch ---
--- a/src/base/ftcalc.c
+++ b/src/base/ftcalc.c
@@ -4,7 +4,7 @@
/* */
/* Arithmetic computations (body). */
/* */
-/* Copyright 1996-2001, 2002, 2003, 2004, 2005, 2006, 2008 by */
+/* Copyright 1996-2006, 2008, 2012 by */
/* David Turner, Robert Wilhelm, and Werner Lemberg. */
/* */
/* This file is part of the FreeType project, and may only be used, */
@@ -307,7 +307,7 @@
q <<= 1;
r |= lo >> 31;
- if ( r >= (FT_UInt32)y )
+ if ( r >= y )
{
r -= y;
q |= 1;
@@ -373,7 +373,7 @@
if ( a <= 46340L && b <= 46340L && c <= 176095L && c > 0 )
a = ( a * b + ( c >> 1 ) ) / c;
- else if ( c > 0 )
+ else if ( (FT_Int32)c > 0 )
{
FT_Int64 temp, temp2;
@@ -412,7 +412,7 @@
if ( a <= 46340L && b <= 46340L && c > 0 )
a = a * b / c;
- else if ( c > 0 )
+ else if ( (FT_Int32)c > 0 )
{
FT_Int64 temp;
@@ -544,7 +544,7 @@
s = (FT_Int32)a; a = FT_ABS( a );
s ^= (FT_Int32)b; b = FT_ABS( b );
- if ( b == 0 )
+ if ( (FT_UInt32)b == 0 )
{
/* check for division by 0 */
q = (FT_UInt32)0x7FFFFFFFL;
@@ -552,15 +552,16 @@
else if ( ( a >> 16 ) == 0 )
{
/* compute result directly */
- q = (FT_UInt32)( (a << 16) + (b >> 1) ) / (FT_UInt32)b;
+ q = (FT_UInt32)( ( a << 16 ) + ( b >> 1 ) ) / (FT_UInt32)b;
}
else
{
/* we need more bits; we have to do it by hand */
FT_Int64 temp, temp2;
- temp.hi = (FT_Int32) (a >> 16);
- temp.lo = (FT_UInt32)(a << 16);
+
+ temp.hi = (FT_Int32) ( a >> 16 );
+ temp.lo = (FT_UInt32)( a << 16 );
temp2.hi = 0;
temp2.lo = (FT_UInt32)( b >> 1 );
FT_Add64( &temp, &temp2, &temp );
freetype-2.4.4-CVE-2012-1144.patch:
ttgload.c | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
--- NEW FILE freetype-2.4.4-CVE-2012-1144.patch ---
--- a/src/truetype/ttgload.c
+++ b/src/truetype/ttgload.c
@@ -362,14 +362,17 @@
if ( n_contours >= 0xFFF || p + ( n_contours + 1 ) * 2 > limit )
goto Invalid_Outline;
- prev_cont = FT_NEXT_USHORT( p );
+ prev_cont = FT_NEXT_SHORT( p );
if ( n_contours > 0 )
cont[0] = prev_cont;
+ if ( prev_cont < 0 )
+ goto Invalid_Outline;
+
for ( cont++; cont < cont_limit; cont++ )
{
- cont[0] = FT_NEXT_USHORT( p );
+ cont[0] = FT_NEXT_SHORT( p );
if ( cont[0] <= prev_cont )
{
/* unordered contours: this is invalid */
freetype-2.4.4-bdf-overflow.patch:
bdflib.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE freetype-2.4.4-bdf-overflow.patch ---
--- a/src/bdf/bdflib.c
+++ b/src/bdf/bdflib.c
@@ -1912,7 +1912,7 @@
glyph->bpr = ( glyph->bbx.width * p->font->bpp + 7 ) >> 3;
bitmap_size = glyph->bpr * glyph->bbx.height;
- if ( bitmap_size > 0xFFFFU )
+ if ( glyph->bpr > 0xFFFFU || bitmap_size > 0xFFFFU )
{
FT_ERROR(( "_bdf_parse_glyphs: " ERRMSG4, lineno ));
error = BDF_Err_Bbx_Too_Big;
Index: freetype-freeworld.spec
===================================================================
RCS file: /cvs/free/rpms/freetype-freeworld/F-15/freetype-freeworld.spec,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -r1.18 -r1.19
--- freetype-freeworld.spec 17 Nov 2011 17:21:42 -0000 1.18
+++ freetype-freeworld.spec 4 Apr 2012 15:43:38 -0000 1.19
@@ -1,7 +1,7 @@
Summary: A free and portable font rendering engine
Name: freetype-freeworld
Version: 2.4.4
-Release: 6%{?dist}
+Release: 7%{?dist}
License: FTL or GPLv2+
Group: System Environment/Libraries
URL: http://www.freetype.org
@@ -28,6 +28,25 @@
Patch92: freetype-2.4.4-CVE-2011-0226.patch
Patch93: freetype-2.4.4-CVE-2011-3256.patch
Patch94: freetype-2.4.4-CVE-2011-3439.patch
+Patch95: freetype-2.4.4-CVE-2012-1126.patch
+Patch96: freetype-2.4.4-CVE-2012-1127.patch
+Patch97: freetype-2.4.4-CVE-2012-1128.patch
+Patch98: freetype-2.4.4-CVE-2012-1130.patch
+Patch99: freetype-2.4.4-CVE-2012-1131.patch
+Patch100: freetype-2.4.4-CVE-2012-1132.patch
+Patch101: freetype-2.4.4-CVE-2012-1133.patch
+Patch102: freetype-2.4.4-CVE-2012-1134.patch
+Patch103: freetype-2.4.4-CVE-2012-1135.patch
+Patch104: freetype-2.4.4-CVE-2012-1136.patch
+Patch105: freetype-2.4.4-CVE-2012-1137.patch
+Patch106: freetype-2.4.4-CVE-2012-1138.patch
+Patch107: freetype-2.4.4-CVE-2012-1139.patch
+Patch108: freetype-2.4.4-CVE-2012-1140.patch
+Patch109: freetype-2.4.4-CVE-2012-1141.patch
+Patch110: freetype-2.4.4-CVE-2012-1142.patch
+Patch111: freetype-2.4.4-CVE-2012-1143.patch
+Patch112: freetype-2.4.4-CVE-2012-1144.patch
+Patch113: freetype-2.4.4-bdf-overflow.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-root-%(%{__id_u} -n)
@@ -63,6 +82,25 @@
%patch92 -p1 -b .CVE-2011-0226
%patch93 -p1 -b .CVE-2011-3256
%patch94 -p1 -b .CVE-2011-3439
+%patch95 -p1 -b .CVE-2012-1126
+%patch96 -p1 -b .CVE-2012-1127
+%patch97 -p1 -b .CVE-2012-1128
+%patch98 -p1 -b .CVE-2012-1130
+%patch99 -p1 -b .CVE-2012-1131
+%patch100 -p1 -b .CVE-2012-1132
+%patch101 -p1 -b .CVE-2012-1133
+%patch102 -p1 -b .CVE-2012-1134
+%patch103 -p1 -b .CVE-2012-1135
+%patch104 -p1 -b .CVE-2012-1136
+%patch105 -p1 -b .CVE-2012-1137
+%patch106 -p1 -b .CVE-2012-1138
+%patch107 -p1 -b .CVE-2012-1139
+%patch108 -p1 -b .CVE-2012-1140
+%patch109 -p1 -b .CVE-2012-1141
+%patch110 -p1 -b .CVE-2012-1142
+%patch111 -p1 -b .CVE-2012-1143
+%patch112 -p1 -b .CVE-2012-1144
+%patch113 -p1 -b .bdf-overflow
%build
@@ -107,6 +145,9 @@
%config(noreplace) %{_sysconfdir}/ld.so.conf.d/%{name}-%{_arch}.conf
%changelog
+* Wed Apr 04 2012 Kevin Kofler <Kevin(a)tigcc.ticalc.org> 2.4.4-7
+- Add security patches from Fedora freetype-2.4.4-8 (rh#806270)
+
* Thu Nov 17 2011 Kevin Kofler <Kevin(a)tigcc.ticalc.org> 2.4.4-6
- Add freetype-2.4.4-CVE-2011-3439.patch from Fedora freetype (rh#753837)
12 years, 7 months
rpms/Nestopia/devel Nestopia.spec,1.6,1.7
by Nicolas Chauvet
Author: kwizart
Update of /cvs/free/rpms/Nestopia/devel
In directory se02.es.rpmfusion.net:/tmp/cvs-serv5232/devel
Modified Files:
Nestopia.spec
Log Message:
Rebuilt
Index: Nestopia.spec
===================================================================
RCS file: /cvs/free/rpms/Nestopia/devel/Nestopia.spec,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- Nestopia.spec 2 Mar 2012 22:13:43 -0000 1.6
+++ Nestopia.spec 4 Apr 2012 12:57:33 -0000 1.7
@@ -3,7 +3,7 @@
Name: Nestopia
Version: 1.40h
-Release: 5%{?dist}
+Release: 6%{?dist}
Summary: A portable open source NES/Famicom emulator
Group: Applications/Emulators
@@ -107,6 +107,9 @@
%doc changelog.txt COPYING README.Linux readme.html
%changelog
+* Wed Apr 04 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 1.40h-6
+- Rebuilt
+
* Fri Mar 02 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 1.40h-5
- Rebuilt for c++ ABI breakage
12 years, 7 months
rpms/Nestopia/F-17 Nestopia.spec,1.6,1.7
by Nicolas Chauvet
Author: kwizart
Update of /cvs/free/rpms/Nestopia/F-17
In directory se02.es.rpmfusion.net:/tmp/cvs-serv5232/F-17
Modified Files:
Nestopia.spec
Log Message:
Rebuilt
Index: Nestopia.spec
===================================================================
RCS file: /cvs/free/rpms/Nestopia/F-17/Nestopia.spec,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- Nestopia.spec 2 Mar 2012 14:58:28 -0000 1.6
+++ Nestopia.spec 4 Apr 2012 12:57:33 -0000 1.7
@@ -3,7 +3,7 @@
Name: Nestopia
Version: 1.40h
-Release: 5%{?dist}
+Release: 6%{?dist}
Summary: A portable open source NES/Famicom emulator
Group: Applications/Emulators
@@ -107,6 +107,9 @@
%doc changelog.txt COPYING README.Linux readme.html
%changelog
+* Wed Apr 04 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 1.40h-6
+- Rebuilt
+
* Fri Mar 02 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 1.40h-5
- Rebuilt for c++ ABI breakage
12 years, 7 months
rpms/acoustid-fingerprinter/devel acoustid-fingerprinter.spec, 1.3, 1.4
by Nicolas Chauvet
Author: kwizart
Update of /cvs/free/rpms/acoustid-fingerprinter/devel
In directory se02.es.rpmfusion.net:/tmp/cvs-serv4948/devel
Modified Files:
acoustid-fingerprinter.spec
Log Message:
Rebuilt
Index: acoustid-fingerprinter.spec
===================================================================
RCS file: /cvs/free/rpms/acoustid-fingerprinter/devel/acoustid-fingerprinter.spec,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- acoustid-fingerprinter.spec 2 Mar 2012 22:06:45 -0000 1.3
+++ acoustid-fingerprinter.spec 4 Apr 2012 12:55:55 -0000 1.4
@@ -1,6 +1,6 @@
Name: acoustid-fingerprinter
Version: 0.5.1
-Release: 3%{?dist}
+Release: 4%{?dist}
Summary: Music AcoustID fingerprinting application
Group: System Environment/Libraries
@@ -72,6 +72,9 @@
%changelog
+* Wed Apr 04 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 0.5.1-4
+- Rebuilt
+
* Fri Mar 02 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 0.5.1-3
- Rebuilt for c++ ABI breakage
12 years, 7 months
rpms/acoustid-fingerprinter/F-17 acoustid-fingerprinter.spec,1.3,1.4
by Nicolas Chauvet
Author: kwizart
Update of /cvs/free/rpms/acoustid-fingerprinter/F-17
In directory se02.es.rpmfusion.net:/tmp/cvs-serv4948/F-17
Modified Files:
acoustid-fingerprinter.spec
Log Message:
Rebuilt
Index: acoustid-fingerprinter.spec
===================================================================
RCS file: /cvs/free/rpms/acoustid-fingerprinter/F-17/acoustid-fingerprinter.spec,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- acoustid-fingerprinter.spec 2 Mar 2012 14:34:48 -0000 1.3
+++ acoustid-fingerprinter.spec 4 Apr 2012 12:55:55 -0000 1.4
@@ -1,6 +1,6 @@
Name: acoustid-fingerprinter
Version: 0.5.1
-Release: 3%{?dist}
+Release: 4%{?dist}
Summary: Music AcoustID fingerprinting application
Group: System Environment/Libraries
@@ -72,6 +72,9 @@
%changelog
+* Wed Apr 04 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 0.5.1-4
+- Rebuilt
+
* Fri Mar 02 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 0.5.1-3
- Rebuilt for c++ ABI breakage
12 years, 7 months
rpms/torrentzip/devel torrentzip.spec,1.5,1.6
by Matthias Saou
Author: thias
Update of /cvs/free/rpms/torrentzip/devel
In directory se02.es.rpmfusion.net:/tmp/cvs-serv3160
Modified Files:
torrentzip.spec
Log Message:
Minor updates
Index: torrentzip.spec
===================================================================
RCS file: /cvs/free/rpms/torrentzip/devel/torrentzip.spec,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- torrentzip.spec 8 Feb 2012 21:56:25 -0000 1.5
+++ torrentzip.spec 4 Apr 2012 12:37:40 -0000 1.6
@@ -3,8 +3,8 @@
Summary: Create identical zip files over multiple systems
Name: torrentzip
Version: 0.2
-Release: 4%{?dist}
-License: GPL
+Release: 5%{?dist}
+License: GPLv2+
Group: Applications/File
URL: http://sourceforge.net/projects/trrntzip
Source: http://dl.sf.net/trrntzip/trrntzip_v02_src.tar.gz
@@ -32,16 +32,16 @@
# No configure, we need to generate it from configure.in
./autogen.sh
%configure
-%{__make} %{?_smp_mflags}
+make %{?_smp_mflags}
%install
-%{__rm} -rf %{buildroot}
-%{__make} install DESTDIR=%{buildroot}
+rm -rf %{buildroot}
+make install DESTDIR=%{buildroot}
%clean
-%{__rm} -rf %{buildroot}
+rm -rf %{buildroot}
%files
@@ -51,6 +51,10 @@
%changelog
+* Wed Apr 4 2012 Matthias Saou <matthias(a)saou.eu> 0.2-5
+- Minor spec file cleanups.
+- Update license field.
+
* Wed Feb 08 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 0.2-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
@@ -61,6 +65,6 @@
- rebuild for RPM Fusion
- define _default_patch_fuzz 2
-* Tue Jan 9 2007 Matthias Saou <http://freshrpms.net/> 0.2-1
+* Tue Jan 9 2007 Matthias Saou <matthias(a)saou.eu> 0.2-1
- Initial RPM release.
12 years, 7 months
rpms/nvidia-173xx-kmod/F-15 kernel-3.3.patch, NONE, 1.1 nvidia-173xx-kmod.spec, 1.68, 1.69
by Leigh Scott
Author: leigh123linux
Update of /cvs/nonfree/rpms/nvidia-173xx-kmod/F-15
In directory se02.es.rpmfusion.net:/tmp/cvs-serv13760
Modified Files:
nvidia-173xx-kmod.spec
Added Files:
kernel-3.3.patch
Log Message:
* Tue Apr 03 2012 leigh scott <leigh123linux(a)googlemail.com> - 173.14.31-2
- patched to build with 3.3.0 kernel
kernel-3.3.patch:
conftest.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- NEW FILE kernel-3.3.patch ---
--- a/usr/src/nv/conftest.sh
+++ b/usr/src/nv/conftest.sh
@@ -122,7 +122,7 @@ build_cflags() {
CFLAGS="$BASE_CFLAGS $MACH_CFLAGS $OUTPUT_CFLAGS -I$HEADERS $AUTOCONF_CFLAGS"
if [ "$ARCH" = "i386" -o "$ARCH" = "x86_64" ]; then
- CFLAGS="$CFLAGS -I$SOURCES/arch/x86/include"
+ CFLAGS="$CFLAGS -I$SOURCES/arch/x86/include -I$SOURCES/arch/x86/include/generated"
fi
if [ -n "$BUILD_PARAMS" ]; then
CFLAGS="$CFLAGS -D$BUILD_PARAMS"
Index: nvidia-173xx-kmod.spec
===================================================================
RCS file: /cvs/nonfree/rpms/nvidia-173xx-kmod/F-15/nvidia-173xx-kmod.spec,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -r1.68 -r1.69
--- nvidia-173xx-kmod.spec 3 Apr 2012 17:29:57 -0000 1.68
+++ nvidia-173xx-kmod.spec 4 Apr 2012 08:01:25 -0000 1.69
@@ -3,12 +3,12 @@
# "buildforkernels newest" macro for just that build; immediately after
# queuing that build enable the macro again for subsequent builds; that way
# a new akmod package will only get build when a new one is actually needed
-%define buildforkernels newest
+%define buildforkernels current
Name: nvidia-173xx-kmod
Version: 173.14.31
# Taken over by kmodtool
-Release: 1%{?dist}.27
+Release: 2%{?dist}
Summary: NVIDIA 173xx display driver kernel module
Group: System Environment/Kernel
License: Redistributable, no modification permitted
@@ -23,6 +23,8 @@
# </switch me>
#http://www.nvnews.net/vbulletin/attachment.php?attachmentid=32570&d=1218222727
+Patch0: kernel-3.3.patch
+
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
# needed for plague to make sure it builds for i586 and i686
@@ -46,12 +48,12 @@
%setup -q -c -T -a 0
# patch loop
-#for arch in x86 x64
-#do
-# pushd nvidiapkg-${arch}
-# empty
-# popd
-#done
+for arch in x86 x64
+do
+pushd nvidiapkg-${arch}
+%patch0 -p1
+popd
+done
for kernel_version in %{?kernel_versions} ; do
@@ -93,6 +95,9 @@
%changelog
+* Tue Apr 03 2012 leigh scott <leigh123linux(a)googlemail.com> - 173.14.31-2
+- patched to build with 3.3.0 kernel
+
* Tue Apr 03 2012 Nicolas Chauvet <kwizart(a)gmail.com> - 173.14.31-1.27
- rebuild for updated kernel
12 years, 7 months
rpms/libspotify Makefile, NONE, 1.1 import.log, NONE, 1.1 pkg.acl, NONE, 1.1
by Nicolas Chauvet
Author: kwizart
Update of /cvs/nonfree/rpms/libspotify
In directory se02.es.rpmfusion.net:/home/rpmfusion/kwizart/nonfree/owners/tmpcvsn11922/rpms/libspotify
Added Files:
Makefile import.log pkg.acl
Log Message:
Setup of module libspotify
--- NEW FILE Makefile ---
# Top level Makefile for module libspotify
all : CVS/Root common-update
@cvs update
common-update : common
@cd common && cvs update
common : CVS/Root
@cvs checkout common
CVS/Root :
@echo "ERROR: This does not look like a CVS checkout" && exit 1
clean :
@find . -type f -name *~ -exec rm -fv {} \;
--- NEW FILE import.log ---
--- NEW FILE pkg.acl ---
12 years, 7 months
rpms/libspotify/devel .cvsignore, NONE, 1.1 Makefile, NONE, 1.1 sources, NONE, 1.1
by Nicolas Chauvet
Author: kwizart
Update of /cvs/nonfree/rpms/libspotify/devel
In directory se02.es.rpmfusion.net:/home/rpmfusion/kwizart/nonfree/owners/tmpcvsn11922/rpms/libspotify/devel
Added Files:
.cvsignore Makefile sources
Log Message:
Setup of module libspotify
--- NEW FILE .cvsignore ---
--- NEW FILE Makefile ---
# Makefile for source rpm: libspotify
# $Id: Makefile,v 1.1 2012/04/04 07:51:22 kwizart Exp $
NAME := libspotify
SPECFILE = $(firstword $(wildcard *.spec))
define find-makefile-common
for d in common ../common ../../common ; do if [ -f $$d/Makefile.common ] ; then if [ -f $$d/CVS/Root -a -w $$/Makefile.common ] ; then cd $$d ; cvs -Q update ; fi ; echo "$$d/Makefile.common" ; break ; fi ; done
endef
MAKEFILE_COMMON := $(shell $(find-makefile-common))
ifeq ($(MAKEFILE_COMMON),)
# attept a checkout
define checkout-makefile-common
test -f CVS/Root && { cvs -Q -d $$(cat CVS/Root) checkout common && echo "common/Makefile.common" ; } || { echo "ERROR: I can't figure out how to checkout the 'common' module." ; exit -1 ; } >&2
endef
MAKEFILE_COMMON := $(shell $(checkout-makefile-common))
endif
include $(MAKEFILE_COMMON)
--- NEW FILE sources ---
12 years, 7 months