Date: Thursday, November 3, 2022 @ 15:44:17
  Author: foutrelis
Revision: 460388

archrelease: copy trunk to testing-x86_64

Added:
  
libarchive/repos/testing-x86_64/0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch
    (from rev 460387, 
libarchive/trunk/0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch)
  
libarchive/repos/testing-x86_64/0002-Validate-entry_bytes_remaining-in-pax_attribute.patch
    (from rev 460387, 
libarchive/trunk/0002-Validate-entry_bytes_remaining-in-pax_attribute.patch)
  
libarchive/repos/testing-x86_64/0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch
    (from rev 460387, 
libarchive/trunk/0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch)
  libarchive/repos/testing-x86_64/PKGBUILD
    (from rev 460387, libarchive/trunk/PKGBUILD)
  libarchive/repos/testing-x86_64/keys/
Deleted:
  
libarchive/repos/testing-x86_64/0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch
  
libarchive/repos/testing-x86_64/0002-Validate-entry_bytes_remaining-in-pax_attribute.patch
  
libarchive/repos/testing-x86_64/0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch
  libarchive/repos/testing-x86_64/PKGBUILD
  libarchive/repos/testing-x86_64/keys/

-----------------------------------------------------------------+
 0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch |   70 +++---
 0002-Validate-entry_bytes_remaining-in-pax_attribute.patch      |   84 +++----
 0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch |   80 +++----
 PKGBUILD                                                        |  111 
+++++-----
 4 files changed, 173 insertions(+), 172 deletions(-)

Deleted: 0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch
===================================================================
--- 0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch     
2022-11-03 15:44:09 UTC (rev 460387)
+++ 0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch     
2022-11-03 15:44:17 UTC (rev 460388)
@@ -1,35 +0,0 @@
-From bff38efe8c110469c5080d387bec62a6ca15b1a5 Mon Sep 17 00:00:00 2001
-From: obiwac <[email protected]>
-Date: Fri, 22 Jul 2022 22:41:10 +0200
-Subject: [PATCH] libarchive: Handle a `calloc` returning NULL (fixes #1754)
-
----
- libarchive/archive_write.c | 8 ++++++++
- 1 file changed, 8 insertions(+)
-
-diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
-index 66592e82..27626b54 100644
---- a/libarchive/archive_write.c
-+++ b/libarchive/archive_write.c
-@@ -201,6 +201,10 @@ __archive_write_allocate_filter(struct archive *_a)
-       struct archive_write_filter *f;
- 
-       f = calloc(1, sizeof(*f));
-+
-+      if (f == NULL)
-+              return (NULL);
-+
-       f->archive = _a;
-       f->state = ARCHIVE_WRITE_FILTER_STATE_NEW;
-       if (a->filter_first == NULL)
-@@ -548,6 +552,10 @@ archive_write_open2(struct archive *_a, void *client_data,
-       a->client_data = client_data;
- 
-       client_filter = __archive_write_allocate_filter(_a);
-+
-+      if (client_filter == NULL)
-+              return (ARCHIVE_FATAL);
-+
-       client_filter->open = archive_write_client_open;
-       client_filter->write = archive_write_client_write;
-       client_filter->close = archive_write_client_close;

Copied: 
libarchive/repos/testing-x86_64/0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch
 (from rev 460387, 
libarchive/trunk/0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch)
===================================================================
--- 0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch             
                (rev 0)
+++ 0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch     
2022-11-03 15:44:17 UTC (rev 460388)
@@ -0,0 +1,35 @@
+From bff38efe8c110469c5080d387bec62a6ca15b1a5 Mon Sep 17 00:00:00 2001
+From: obiwac <[email protected]>
+Date: Fri, 22 Jul 2022 22:41:10 +0200
+Subject: [PATCH] libarchive: Handle a `calloc` returning NULL (fixes #1754)
+
+---
+ libarchive/archive_write.c | 8 ++++++++
+ 1 file changed, 8 insertions(+)
+
+diff --git a/libarchive/archive_write.c b/libarchive/archive_write.c
+index 66592e82..27626b54 100644
+--- a/libarchive/archive_write.c
++++ b/libarchive/archive_write.c
+@@ -201,6 +201,10 @@ __archive_write_allocate_filter(struct archive *_a)
+       struct archive_write_filter *f;
+ 
+       f = calloc(1, sizeof(*f));
++
++      if (f == NULL)
++              return (NULL);
++
+       f->archive = _a;
+       f->state = ARCHIVE_WRITE_FILTER_STATE_NEW;
+       if (a->filter_first == NULL)
+@@ -548,6 +552,10 @@ archive_write_open2(struct archive *_a, void *client_data,
+       a->client_data = client_data;
+ 
+       client_filter = __archive_write_allocate_filter(_a);
++
++      if (client_filter == NULL)
++              return (ARCHIVE_FATAL);
++
+       client_filter->open = archive_write_client_open;
+       client_filter->write = archive_write_client_write;
+       client_filter->close = archive_write_client_close;

Deleted: 0002-Validate-entry_bytes_remaining-in-pax_attribute.patch
===================================================================
--- 0002-Validate-entry_bytes_remaining-in-pax_attribute.patch  2022-11-03 
15:44:09 UTC (rev 460387)
+++ 0002-Validate-entry_bytes_remaining-in-pax_attribute.patch  2022-11-03 
15:44:17 UTC (rev 460388)
@@ -1,42 +0,0 @@
-From fc8c6d2786ecba731d77d33fe3b034f581fcbde3 Mon Sep 17 00:00:00 2001
-From: Ben Wagner <[email protected]>
-Date: Tue, 19 Jul 2022 13:02:40 -0400
-Subject: [PATCH] Validate entry_bytes_remaining in pax_attribute
-
-The `size` attribute may contain a negative or too large value. Check
-the range of the `entry_bytes_remaining` in `pax_attribute` the same way
-as `header_common`. The test which is added passes both with and without
-this change in a normal debug build. It is necessary to run with
-`-fsanitize=undefined` to see that the undefined behavior is avoided.
-
-Bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48467
----
- libarchive/archive_read_support_format_tar.c  | 15 ++++++
- 1 files changed, 15 insertions(+)
-
-diff --git a/libarchive/archive_read_support_format_tar.c 
b/libarchive/archive_read_support_format_tar.c
-index bfdad7f8..e31f1cc4 100644
---- a/libarchive/archive_read_support_format_tar.c
-+++ b/libarchive/archive_read_support_format_tar.c
-@@ -2108,6 +2108,21 @@ pax_attribute(struct archive_read *a, struct tar *tar,
-                       /* "size" is the size of the data in the entry. */
-                       tar->entry_bytes_remaining
-                           = tar_atol10(value, strlen(value));
-+                      if (tar->entry_bytes_remaining < 0) {
-+                              tar->entry_bytes_remaining = 0;
-+                              archive_set_error(&a->archive,
-+                                  ARCHIVE_ERRNO_MISC,
-+                                  "Tar size attribute is negative");
-+                              return (ARCHIVE_FATAL);
-+                      }
-+                      if (tar->entry_bytes_remaining == INT64_MAX) {
-+                              /* Note: tar_atol returns INT64_MAX on overflow 
*/
-+                              tar->entry_bytes_remaining = 0;
-+                              archive_set_error(&a->archive,
-+                                  ARCHIVE_ERRNO_MISC,
-+                                  "Tar size attribute overflow");
-+                              return (ARCHIVE_FATAL);
-+                      }
-                       /*
-                        * The "size" pax header keyword always overrides the
-                        * "size" field in the tar header.

Copied: 
libarchive/repos/testing-x86_64/0002-Validate-entry_bytes_remaining-in-pax_attribute.patch
 (from rev 460387, 
libarchive/trunk/0002-Validate-entry_bytes_remaining-in-pax_attribute.patch)
===================================================================
--- 0002-Validate-entry_bytes_remaining-in-pax_attribute.patch                  
        (rev 0)
+++ 0002-Validate-entry_bytes_remaining-in-pax_attribute.patch  2022-11-03 
15:44:17 UTC (rev 460388)
@@ -0,0 +1,42 @@
+From fc8c6d2786ecba731d77d33fe3b034f581fcbde3 Mon Sep 17 00:00:00 2001
+From: Ben Wagner <[email protected]>
+Date: Tue, 19 Jul 2022 13:02:40 -0400
+Subject: [PATCH] Validate entry_bytes_remaining in pax_attribute
+
+The `size` attribute may contain a negative or too large value. Check
+the range of the `entry_bytes_remaining` in `pax_attribute` the same way
+as `header_common`. The test which is added passes both with and without
+this change in a normal debug build. It is necessary to run with
+`-fsanitize=undefined` to see that the undefined behavior is avoided.
+
+Bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48467
+---
+ libarchive/archive_read_support_format_tar.c  | 15 ++++++
+ 1 files changed, 15 insertions(+)
+
+diff --git a/libarchive/archive_read_support_format_tar.c 
b/libarchive/archive_read_support_format_tar.c
+index bfdad7f8..e31f1cc4 100644
+--- a/libarchive/archive_read_support_format_tar.c
++++ b/libarchive/archive_read_support_format_tar.c
+@@ -2108,6 +2108,21 @@ pax_attribute(struct archive_read *a, struct tar *tar,
+                       /* "size" is the size of the data in the entry. */
+                       tar->entry_bytes_remaining
+                           = tar_atol10(value, strlen(value));
++                      if (tar->entry_bytes_remaining < 0) {
++                              tar->entry_bytes_remaining = 0;
++                              archive_set_error(&a->archive,
++                                  ARCHIVE_ERRNO_MISC,
++                                  "Tar size attribute is negative");
++                              return (ARCHIVE_FATAL);
++                      }
++                      if (tar->entry_bytes_remaining == INT64_MAX) {
++                              /* Note: tar_atol returns INT64_MAX on overflow 
*/
++                              tar->entry_bytes_remaining = 0;
++                              archive_set_error(&a->archive,
++                                  ARCHIVE_ERRNO_MISC,
++                                  "Tar size attribute overflow");
++                              return (ARCHIVE_FATAL);
++                      }
+                       /*
+                        * The "size" pax header keyword always overrides the
+                        * "size" field in the tar header.

Deleted: 0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch
===================================================================
--- 0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch     
2022-11-03 15:44:09 UTC (rev 460387)
+++ 0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch     
2022-11-03 15:44:17 UTC (rev 460388)
@@ -1,40 +0,0 @@
-From a2f68263a1da5ad227bcb9cd8fa91b93c8b6c99f Mon Sep 17 00:00:00 2001
-From: Khem Raj <[email protected]>
-Date: Mon, 25 Jul 2022 10:56:53 -0700
-Subject: [PATCH] libarchive: Do not include sys/mount.h when linux/fs.h is 
present
-
-These headers are in conflict and only one is needed by
-archive_read_disk_posix.c therefore include linux/fs.h if it exists
-otherwise include sys/mount.h
-
-It also helps compiling with glibc 2.36
-where sys/mount.h conflicts with linux/mount.h see [1]
-
-[1] https://sourceware.org/glibc/wiki/Release/2.36
----
- libarchive/archive_read_disk_posix.c | 5 ++---
- 1 file changed, 2 insertions(+), 3 deletions(-)
-
-diff --git a/libarchive/archive_read_disk_posix.c 
b/libarchive/archive_read_disk_posix.c
-index 2b39e672..a96008db 100644
---- a/libarchive/archive_read_disk_posix.c
-+++ b/libarchive/archive_read_disk_posix.c
-@@ -34,9 +34,6 @@ __FBSDID("$FreeBSD$");
- #ifdef HAVE_SYS_PARAM_H
- #include <sys/param.h>
- #endif
--#ifdef HAVE_SYS_MOUNT_H
--#include <sys/mount.h>
--#endif
- #ifdef HAVE_SYS_STAT_H
- #include <sys/stat.h>
- #endif
-@@ -54,6 +51,8 @@ __FBSDID("$FreeBSD$");
- #endif
- #ifdef HAVE_LINUX_FS_H
- #include <linux/fs.h>
-+#elif HAVE_SYS_MOUNT_H
-+#include <sys/mount.h>
- #endif
- /*
-  * Some Linux distributions have both linux/ext2_fs.h and ext2fs/ext2_fs.h.

Copied: 
libarchive/repos/testing-x86_64/0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch
 (from rev 460387, 
libarchive/trunk/0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch)
===================================================================
--- 0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch             
                (rev 0)
+++ 0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch     
2022-11-03 15:44:17 UTC (rev 460388)
@@ -0,0 +1,40 @@
+From a2f68263a1da5ad227bcb9cd8fa91b93c8b6c99f Mon Sep 17 00:00:00 2001
+From: Khem Raj <[email protected]>
+Date: Mon, 25 Jul 2022 10:56:53 -0700
+Subject: [PATCH] libarchive: Do not include sys/mount.h when linux/fs.h is 
present
+
+These headers are in conflict and only one is needed by
+archive_read_disk_posix.c therefore include linux/fs.h if it exists
+otherwise include sys/mount.h
+
+It also helps compiling with glibc 2.36
+where sys/mount.h conflicts with linux/mount.h see [1]
+
+[1] https://sourceware.org/glibc/wiki/Release/2.36
+---
+ libarchive/archive_read_disk_posix.c | 5 ++---
+ 1 file changed, 2 insertions(+), 3 deletions(-)
+
+diff --git a/libarchive/archive_read_disk_posix.c 
b/libarchive/archive_read_disk_posix.c
+index 2b39e672..a96008db 100644
+--- a/libarchive/archive_read_disk_posix.c
++++ b/libarchive/archive_read_disk_posix.c
+@@ -34,9 +34,6 @@ __FBSDID("$FreeBSD$");
+ #ifdef HAVE_SYS_PARAM_H
+ #include <sys/param.h>
+ #endif
+-#ifdef HAVE_SYS_MOUNT_H
+-#include <sys/mount.h>
+-#endif
+ #ifdef HAVE_SYS_STAT_H
+ #include <sys/stat.h>
+ #endif
+@@ -54,6 +51,8 @@ __FBSDID("$FreeBSD$");
+ #endif
+ #ifdef HAVE_LINUX_FS_H
+ #include <linux/fs.h>
++#elif HAVE_SYS_MOUNT_H
++#include <sys/mount.h>
+ #endif
+ /*
+  * Some Linux distributions have both linux/ext2_fs.h and ext2fs/ext2_fs.h.

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2022-11-03 15:44:09 UTC (rev 460387)
+++ PKGBUILD    2022-11-03 15:44:17 UTC (rev 460388)
@@ -1,55 +0,0 @@
-# Maintainer: BartÅ‚omiej Piotrowski <[email protected]>
-# Maintainer: Dan McGee <[email protected]>
-
-pkgname=libarchive
-pkgver=3.6.1
-pkgrel=4
-pkgdesc='Multi-format archive and compression library'
-arch=('x86_64')
-url='https://libarchive.org/'
-license=('BSD')
-depends=('acl' 'libacl.so' 'bzip2' 'expat' 'lz4' 'openssl' 'xz' 'zlib' 'zstd')
-provides=('libarchive.so')
-options=('debug')
-validpgpkeys=('A5A45B12AD92D964B89EEE2DEC560C81CEC2276E') # Martin Matuska 
<[email protected]>
-source=("https://github.com/${pkgname}/${pkgname}/releases/download/v${pkgver}/${pkgname}-${pkgver}.tar.xz"{,.asc}
-        '0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch'
-        '0002-Validate-entry_bytes_remaining-in-pax_attribute.patch'
-        '0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch')
-sha256sums=('5a411aceb978f43e626f0c2d1812ddd8807b645ed892453acabd532376c148e6'
-            'SKIP'
-            'bc52b2b2b99915894b436c97872d5d50e94c8c7483865a028fad9a710c837fa7'
-            '38c8d9b00f3259558e67e6fdf790ccbf8ecbba2de101476c2416d87b1679bcb9'
-            '99c85a9b8e6c16131cefaf1040d5fa15cd565ecf8c71c1f644c8fa47fe1306dc')
-
-prepare() {
-  cd "${pkgname}-${pkgver}"
-
-  patch -Np1 < 
../0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch
-  patch -Np1 < ../0002-Validate-entry_bytes_remaining-in-pax_attribute.patch
-  patch -Np1 < 
../0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch
-}
-
-build() {
-  cd "${pkgname}-${pkgver}"
-
-  ./configure \
-      --prefix=/usr \
-      --without-xml2 \
-      --without-nettle \
-      --disable-static
-  make
-}
-
-check() {
-  cd "${pkgname}-${pkgver}"
-
-  make check
-}
-
-package() {
-  cd "${pkgname}-${pkgver}"
-
-  make DESTDIR="$pkgdir" install
-  install -Dm0644 COPYING "$pkgdir/usr/share/licenses/libarchive/COPYING"
-}

Copied: libarchive/repos/testing-x86_64/PKGBUILD (from rev 460387, 
libarchive/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2022-11-03 15:44:17 UTC (rev 460388)
@@ -0,0 +1,56 @@
+# Maintainer: BartÅ‚omiej Piotrowski <[email protected]>
+# Maintainer: Dan McGee <[email protected]>
+
+pkgname=libarchive
+pkgver=3.6.1
+pkgrel=5
+pkgdesc='Multi-format archive and compression library'
+arch=('x86_64')
+url='https://libarchive.org/'
+license=('BSD')
+depends=('acl' 'libacl.so' 'bzip2' 'expat' 'lz4' 'openssl' 'libcrypto.so' 'xz'
+         'zlib' 'zstd')
+provides=('libarchive.so')
+options=('debug')
+validpgpkeys=('A5A45B12AD92D964B89EEE2DEC560C81CEC2276E') # Martin Matuska 
<[email protected]>
+source=("https://github.com/${pkgname}/${pkgname}/releases/download/v${pkgver}/${pkgname}-${pkgver}.tar.xz"{,.asc}
+        '0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch'
+        '0002-Validate-entry_bytes_remaining-in-pax_attribute.patch'
+        '0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch')
+sha256sums=('5a411aceb978f43e626f0c2d1812ddd8807b645ed892453acabd532376c148e6'
+            'SKIP'
+            'bc52b2b2b99915894b436c97872d5d50e94c8c7483865a028fad9a710c837fa7'
+            '38c8d9b00f3259558e67e6fdf790ccbf8ecbba2de101476c2416d87b1679bcb9'
+            '99c85a9b8e6c16131cefaf1040d5fa15cd565ecf8c71c1f644c8fa47fe1306dc')
+
+prepare() {
+  cd "${pkgname}-${pkgver}"
+
+  patch -Np1 < 
../0001-libarchive-Handle-a-calloc-returning-NULL-fixes-1754.patch
+  patch -Np1 < ../0002-Validate-entry_bytes_remaining-in-pax_attribute.patch
+  patch -Np1 < 
../0003-libarchive-Do-not-include-sys-mount.h-when-linux-fs..patch
+}
+
+build() {
+  cd "${pkgname}-${pkgver}"
+
+  ./configure \
+      --prefix=/usr \
+      --without-xml2 \
+      --without-nettle \
+      --disable-static
+  make
+}
+
+check() {
+  cd "${pkgname}-${pkgver}"
+
+  make check
+}
+
+package() {
+  cd "${pkgname}-${pkgver}"
+
+  make DESTDIR="$pkgdir" install
+  install -Dm0644 COPYING "$pkgdir/usr/share/licenses/libarchive/COPYING"
+}

Reply via email to