summaryrefslogtreecommitdiff
path: root/source/n/rp-pppoe/rp-pppoe.SlackBuild
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2018-11-29 05:53:27 +0000
committerEric Hameleers <alien@slackware.com>2018-11-29 17:59:45 +0100
commit7284497dcf1ed750a9703553209d899a8c111149 (patch)
treed28ab1c79f228cb433fd739f28cd225fdcdae42d /source/n/rp-pppoe/rp-pppoe.SlackBuild
parent388986876373b8d6d9053c36196978464bd3362e (diff)
downloadcurrent-7284497dcf1ed750a9703553209d899a8c111149.tar.gz
Thu Nov 29 05:53:27 UTC 201820181129055327
a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/n/rp-pppoe/rp-pppoe.SlackBuild')
-rwxr-xr-xsource/n/rp-pppoe/rp-pppoe.SlackBuild7
1 files changed, 3 insertions, 4 deletions
diff --git a/source/n/rp-pppoe/rp-pppoe.SlackBuild b/source/n/rp-pppoe/rp-pppoe.SlackBuild
index f3b95e11..81305d79 100755
--- a/source/n/rp-pppoe/rp-pppoe.SlackBuild
+++ b/source/n/rp-pppoe/rp-pppoe.SlackBuild
@@ -23,8 +23,8 @@
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=rp-pppoe
-VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z* | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-2}
+VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
+BUILD=${BUILD:-1}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
@@ -63,7 +63,7 @@ rm -rf $PKG
mkdir -p $TMP $PKG
cd $TMP
rm -rf rp-pppoe-$VERSION
-tar xvf $CWD/rp-pppoe-$VERSION.tar.?z* || exit 1
+tar xvf $CWD/rp-pppoe-$VERSION.tar.?z || exit 1
cd rp-pppoe-$VERSION || exit 1
chown -R root:root .
find . \
@@ -76,7 +76,6 @@ zcat $CWD/rp-pppoe-3.12-ip-allocation.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/rp-pppoe-3.12-plugin.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/rp-pppoe-3.12-pluginpath.patch.gz | patch -p1 --verbose || exit 1
zcat $CWD/rp-pppoe-manpages.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/rp-pppoe-3.12-bz1469960-new-kernel-header.patch.gz | patch -p1 --verbose || exit 1
cd src