All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH/next 1/1] package/screen: bump to version 4.9.0
@ 2022-02-23 22:13 Fabrice Fontaine
  2022-03-12 20:16 ` Arnout Vandecappelle
  0 siblings, 1 reply; 2+ messages in thread
From: Fabrice Fontaine @ 2022-02-23 22:13 UTC (permalink / raw)
  To: buildroot; +Cc: Fabrice Fontaine

- Drop latest patch (already in version)
- Update indentation in hash file (two spaces)

https://lists.gnu.org/archive/html/screen-users/2022-02/msg00000.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
---
 package/screen/0008-CVE-2021-26937.patch | 68 ------------------------
 package/screen/screen.hash               |  6 +--
 package/screen/screen.mk                 |  5 +-
 3 files changed, 4 insertions(+), 75 deletions(-)
 delete mode 100644 package/screen/0008-CVE-2021-26937.patch

diff --git a/package/screen/0008-CVE-2021-26937.patch b/package/screen/0008-CVE-2021-26937.patch
deleted file mode 100644
index df7efa0294..0000000000
--- a/package/screen/0008-CVE-2021-26937.patch
+++ /dev/null
@@ -1,68 +0,0 @@
-Description: [CVE-2021-26937] Fix out of bounds array access
-Author: Michael Schröder <mls@suse.de>
-Bug-Debian: https://bugs.debian.org/982435
-Bug: https://savannah.gnu.org/bugs/?60030
-Bug: https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00000.html
-Bug-OSS-Security: https://www.openwall.com/lists/oss-security/2021/02/09/3
-Origin: https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00010.html
-
-Downloaded from Debian:
-https://sources.debian.org/data/main/s/screen/4.8.0-5/debian/patches/99_CVE-2021-26937.patch
-
-Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---- a/encoding.c
-+++ b/encoding.c
-@@ -43,7 +43,7 @@
- # ifdef UTF8
- static int   recode_char __P((int, int, int));
- static int   recode_char_to_encoding __P((int, int));
--static void  comb_tofront __P((int, int));
-+static void  comb_tofront __P((int));
- #  ifdef DW_CHARS
- static int   recode_char_dw __P((int, int *, int, int));
- static int   recode_char_dw_to_encoding __P((int, int *, int));
-@@ -1263,6 +1263,8 @@
-     {0x30000, 0x3FFFD},
-   };
- 
-+  if (c >= 0xdf00 && c <= 0xdfff)
-+    return 1;          /* dw combining sequence */
-   return ((bisearch(c, wide, sizeof(wide) / sizeof(struct interval) - 1)) ||
-           (cjkwidth &&
-            bisearch(c, ambiguous,
-@@ -1330,11 +1332,12 @@
- }
- 
- static void
--comb_tofront(root, i)
--int root, i;
-+comb_tofront(i)
-+int i;
- {
-   for (;;)
-     {
-+      int root = i >= 0x700 ? 0x801 : 0x800;
-       debug1("bring to front: %x\n", i);
-       combchars[combchars[i]->prev]->next = combchars[i]->next;
-       combchars[combchars[i]->next]->prev = combchars[i]->prev;
-@@ -1396,9 +1399,9 @@
-     {
-       /* full, recycle old entry */
-       if (c1 >= 0xd800 && c1 < 0xe000)
--        comb_tofront(root, c1 - 0xd800);
-+        comb_tofront(c1 - 0xd800);
-       i = combchars[root]->prev;
--      if (c1 == i + 0xd800)
-+      if (i == 0x800 || i == 0x801 || c1 == i + 0xd800)
- 	{
- 	  /* completely full, can't recycle */
- 	  debug("utf8_handle_comp: completely full!\n");
-@@ -1422,7 +1425,7 @@
-   mc->font  = (i >> 8) + 0xd8;
-   mc->fontx = 0;
-   debug3("combinig char %x %x -> %x\n", c1, c, i + 0xd800);
--  comb_tofront(root, i);
-+  comb_tofront(i);
- }
- 
- #else /* !UTF8 */
diff --git a/package/screen/screen.hash b/package/screen/screen.hash
index ca74ba8913..a261d3100d 100644
--- a/package/screen/screen.hash
+++ b/package/screen/screen.hash
@@ -1,5 +1,5 @@
 # Locally calculated after checking pgp signature
-# https://ftp.gnu.org/gnu/screen/screen-4.8.0.tar.gz.sig
-sha256 6e11b13d8489925fde25dfb0935bf6ed71f9eb47eff233a181e078fde5655aa1  screen-4.8.0.tar.gz
+# https://ftp.gnu.org/gnu/screen/screen-4.9.0.tar.gz.sig
+sha256  f9335281bb4d1538ed078df78a20c2f39d3af9a4e91c57d084271e0289c730f4  screen-4.9.0.tar.gz
 # Locally calculated
-sha256 8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903  COPYING
+sha256  8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903  COPYING
diff --git a/package/screen/screen.mk b/package/screen/screen.mk
index 843c71fc2a..3239a1c1f3 100644
--- a/package/screen/screen.mk
+++ b/package/screen/screen.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-SCREEN_VERSION = 4.8.0
+SCREEN_VERSION = 4.9.0
 SCREEN_SITE = $(BR2_GNU_MIRROR)/screen
 SCREEN_LICENSE = GPL-3.0+
 SCREEN_LICENSE_FILES = COPYING
@@ -16,9 +16,6 @@ SCREEN_CONF_ENV = CFLAGS="$(TARGET_CFLAGS)"
 SCREEN_CONF_OPTS = --enable-colors256
 SCREEN_INSTALL_TARGET_OPTS = DESTDIR=$(TARGET_DIR) SCREEN=screen install_bin
 
-# 0008_CVE-2021-26937.patch
-SCREEN_IGNORE_CVES += CVE-2021-26937
-
 ifeq ($(BR2_PACKAGE_LINUX_PAM),y)
 SCREEN_DEPENDENCIES += linux-pam
 SCREEN_CONF_OPTS += --enable-pam
-- 
2.34.1

_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [Buildroot] [PATCH/next 1/1] package/screen: bump to version 4.9.0
  2022-02-23 22:13 [Buildroot] [PATCH/next 1/1] package/screen: bump to version 4.9.0 Fabrice Fontaine
@ 2022-03-12 20:16 ` Arnout Vandecappelle
  0 siblings, 0 replies; 2+ messages in thread
From: Arnout Vandecappelle @ 2022-03-12 20:16 UTC (permalink / raw)
  To: Fabrice Fontaine, buildroot


On 23/02/2022 23:13, Fabrice Fontaine wrote:
> - Drop latest patch (already in version)
> - Update indentation in hash file (two spaces)
>
> https://lists.gnu.org/archive/html/screen-users/2022-02/msg00000.html
>
> Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>

  Applied to master, thanks.

  Regards,
  Arnout

> ---
>   package/screen/0008-CVE-2021-26937.patch | 68 ------------------------
>   package/screen/screen.hash               |  6 +--
>   package/screen/screen.mk                 |  5 +-
>   3 files changed, 4 insertions(+), 75 deletions(-)
>   delete mode 100644 package/screen/0008-CVE-2021-26937.patch
>
> diff --git a/package/screen/0008-CVE-2021-26937.patch b/package/screen/0008-CVE-2021-26937.patch
> deleted file mode 100644
> index df7efa0294..0000000000
> --- a/package/screen/0008-CVE-2021-26937.patch
> +++ /dev/null
> @@ -1,68 +0,0 @@
> -Description: [CVE-2021-26937] Fix out of bounds array access
> -Author: Michael Schröder <mls@suse.de>
> -Bug-Debian: https://bugs.debian.org/982435
> -Bug: https://savannah.gnu.org/bugs/?60030
> -Bug: https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00000.html
> -Bug-OSS-Security: https://www.openwall.com/lists/oss-security/2021/02/09/3
> -Origin: https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00010.html
> -
> -Downloaded from Debian:
> -https://sources.debian.org/data/main/s/screen/4.8.0-5/debian/patches/99_CVE-2021-26937.patch
> -
> -Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
> ---- a/encoding.c
> -+++ b/encoding.c
> -@@ -43,7 +43,7 @@
> - # ifdef UTF8
> - static int   recode_char __P((int, int, int));
> - static int   recode_char_to_encoding __P((int, int));
> --static void  comb_tofront __P((int, int));
> -+static void  comb_tofront __P((int));
> - #  ifdef DW_CHARS
> - static int   recode_char_dw __P((int, int *, int, int));
> - static int   recode_char_dw_to_encoding __P((int, int *, int));
> -@@ -1263,6 +1263,8 @@
> -     {0x30000, 0x3FFFD},
> -   };
> -
> -+  if (c >= 0xdf00 && c <= 0xdfff)
> -+    return 1;          /* dw combining sequence */
> -   return ((bisearch(c, wide, sizeof(wide) / sizeof(struct interval) - 1)) ||
> -           (cjkwidth &&
> -            bisearch(c, ambiguous,
> -@@ -1330,11 +1332,12 @@
> - }
> -
> - static void
> --comb_tofront(root, i)
> --int root, i;
> -+comb_tofront(i)
> -+int i;
> - {
> -   for (;;)
> -     {
> -+      int root = i >= 0x700 ? 0x801 : 0x800;
> -       debug1("bring to front: %x\n", i);
> -       combchars[combchars[i]->prev]->next = combchars[i]->next;
> -       combchars[combchars[i]->next]->prev = combchars[i]->prev;
> -@@ -1396,9 +1399,9 @@
> -     {
> -       /* full, recycle old entry */
> -       if (c1 >= 0xd800 && c1 < 0xe000)
> --        comb_tofront(root, c1 - 0xd800);
> -+        comb_tofront(c1 - 0xd800);
> -       i = combchars[root]->prev;
> --      if (c1 == i + 0xd800)
> -+      if (i == 0x800 || i == 0x801 || c1 == i + 0xd800)
> - 	{
> - 	  /* completely full, can't recycle */
> - 	  debug("utf8_handle_comp: completely full!\n");
> -@@ -1422,7 +1425,7 @@
> -   mc->font  = (i >> 8) + 0xd8;
> -   mc->fontx = 0;
> -   debug3("combinig char %x %x -> %x\n", c1, c, i + 0xd800);
> --  comb_tofront(root, i);
> -+  comb_tofront(i);
> - }
> -
> - #else /* !UTF8 */
> diff --git a/package/screen/screen.hash b/package/screen/screen.hash
> index ca74ba8913..a261d3100d 100644
> --- a/package/screen/screen.hash
> +++ b/package/screen/screen.hash
> @@ -1,5 +1,5 @@
>   # Locally calculated after checking pgp signature
> -# https://ftp.gnu.org/gnu/screen/screen-4.8.0.tar.gz.sig
> -sha256 6e11b13d8489925fde25dfb0935bf6ed71f9eb47eff233a181e078fde5655aa1  screen-4.8.0.tar.gz
> +# https://ftp.gnu.org/gnu/screen/screen-4.9.0.tar.gz.sig
> +sha256  f9335281bb4d1538ed078df78a20c2f39d3af9a4e91c57d084271e0289c730f4  screen-4.9.0.tar.gz
>   # Locally calculated
> -sha256 8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903  COPYING
> +sha256  8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903  COPYING
> diff --git a/package/screen/screen.mk b/package/screen/screen.mk
> index 843c71fc2a..3239a1c1f3 100644
> --- a/package/screen/screen.mk
> +++ b/package/screen/screen.mk
> @@ -4,7 +4,7 @@
>   #
>   ################################################################################
>   
> -SCREEN_VERSION = 4.8.0
> +SCREEN_VERSION = 4.9.0
>   SCREEN_SITE = $(BR2_GNU_MIRROR)/screen
>   SCREEN_LICENSE = GPL-3.0+
>   SCREEN_LICENSE_FILES = COPYING
> @@ -16,9 +16,6 @@ SCREEN_CONF_ENV = CFLAGS="$(TARGET_CFLAGS)"
>   SCREEN_CONF_OPTS = --enable-colors256
>   SCREEN_INSTALL_TARGET_OPTS = DESTDIR=$(TARGET_DIR) SCREEN=screen install_bin
>   
> -# 0008_CVE-2021-26937.patch
> -SCREEN_IGNORE_CVES += CVE-2021-26937
> -
>   ifeq ($(BR2_PACKAGE_LINUX_PAM),y)
>   SCREEN_DEPENDENCIES += linux-pam
>   SCREEN_CONF_OPTS += --enable-pam
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-03-12 20:16 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-02-23 22:13 [Buildroot] [PATCH/next 1/1] package/screen: bump to version 4.9.0 Fabrice Fontaine
2022-03-12 20:16 ` Arnout Vandecappelle

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.