SPECS: php.spec - gentoo patchset updated to 5.2.8-r1 (CVE-2008-5498 and ot...

glen glen at pld-linux.org
Mon Jan 5 15:47:25 CET 2009


Author: glen                         Date: Mon Jan  5 14:47:25 2009 GMT
Module: SPECS                         Tag: HEAD
---- Log message:
- gentoo patchset updated to 5.2.8-r1 (CVE-2008-5498 and other crash fixes); rel 6

---- Files affected:
SPECS:
   php.spec (1.769 -> 1.770) 

---- Diffs:

================================================================
Index: SPECS/php.spec
diff -u SPECS/php.spec:1.769 SPECS/php.spec:1.770
--- SPECS/php.spec:1.769	Mon Jan  5 15:32:28 2009
+++ SPECS/php.spec	Mon Jan  5 15:47:20 2009
@@ -85,7 +85,7 @@
 %undefine	with_filter
 %endif
 
-%define		rel 5
+%define		rel 6
 Summary:	PHP: Hypertext Preprocessor
 Summary(fr.UTF-8):	Le langage de script embarque-HTML PHP
 Summary(pl.UTF-8):	Język skryptowy PHP
@@ -107,8 +107,8 @@
 Source6:	%{name}-cli.ini
 # Taken from: http://browsers.garykeith.com/downloads.asp
 Source8:	%{name}_browscap.ini
-Source9:	ftp://distfiles.gentoo.org/pub/gentoo/distfiles/%{name}-patchset-5.2.6-r8.tar.bz2
-# Source9-md5:	0f411800537648d0748417124291bd58
+Source9:	ftp://distfiles.gentoo.org/pub/gentoo/distfiles/%{name}-patchset-%{version}-r1.tar.bz2
+# Source9-md5:	d67f23f5e69664e06fce89b064d5bbab
 Source10:	%{name}-fpm.init
 Source11:	%{name}-fpm.logrotate
 Patch0:		%{name}-shared.patch
@@ -1648,25 +1648,6 @@
 %{__tar} jxf %{SOURCE9}
 v=%{SOURCE9} v=${v#*/php-patchset-} v=${v%%-*}
 mv $v/$v gentoo-patchset
-rm -f gentoo-patchset/001_tests-ignore-php-ini.patch
-rm -f gentoo-patchset/002_run-tests-ignore-php-ini.patch
-rm -f gentoo-patchset/005_stream_context_set_params-crash.patch
-rm -f gentoo-patchset/006_PDORow-crash.patch
-rm -f gentoo-patchset/007_dom-setAttributeNode-crash.patch
-rm -f gentoo-patchset/008_imap-bufferoverflows.patch
-rm -f gentoo-patchset/009_array-function-crashes.patch
-rm -f gentoo-patchset/010_ticks-zts-crashes.patch
-rm -f gentoo-patchset/011_ze-number-overflow-crash.patch
-rm -f gentoo-patchset/012_pcre-integer-overflow.patch
-rm -f gentoo-patchset/013_GNU_SOURCE-string.c.patch
-rm -f gentoo-patchset/014_explode-overflow.patch
-rm -f gentoo-patchset/015_CVE-2008-2665-wrapper-safemode-bypass.patch
-rm -f gentoo-patchset/016_cgi-doubledot-filename-DoS.patch
-rm -f gentoo-patchset/017_xmlrpc-invalid-callback-crash.patch
-rm -f gentoo-patchset/018_gd-imageloadfont-overflows.patch
-rm -f gentoo-patchset/019_new-memory-corruption.patch
-rm -f gentoo-patchset/020_gd-noise-gbug234459.patch
-rm -f gentoo-patchset/021_snmp-memleaks-gbug231528.patch
 for a in gentoo-patchset/*.patch; do
 	%{__patch} -p1 < $a
 done
@@ -2904,6 +2885,9 @@
 All persons listed below can be reached at <cvs_login>@pld-linux.org
 
 $Log$
+Revision 1.770  2009/01/05 14:47:20  glen
+- gentoo patchset updated to 5.2.8-r1 (CVE-2008-5498 and other crash fixes); rel 6
+
 Revision 1.769  2009/01/05 14:32:28  glen
 - sanitize error output (display_errors=stderr, log_errors=off) so errors are displayed only once to stderr in CLI SAPI; rel 5
 
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/SPECS/php.spec?r1=1.769&r2=1.770&f=u



More information about the pld-cvs-commit mailing list