Hello community, here is the log from the commit of package flash-player.4682 for openSUSE:13.1:NonFree:Update checked in at 2016-10-27 21:49:52 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.1:NonFree:Update/flash-player.4682 (Old) and /work/SRC/openSUSE:13.1:NonFree:Update/.flash-player.4682.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "flash-player.4682" Changes: -------- New Changes file: --- /dev/null 2016-10-27 01:54:32.792041256 +0200 +++ /work/SRC/openSUSE:13.1:NonFree:Update/.flash-player.4682.new/flash-player.changes 2016-10-27 21:49:53.000000000 +0200 @@ -0,0 +1,942 @@ +------------------------------------------------------------------- +Wed Oct 26 18:44:52 UTC 2016 - [email protected] + +- Security update to 11.2.202.643 (bsc#1007098): + * APSB16-36, CVE-2016-7855 + +------------------------------------------------------------------- +Tue Oct 11 18:09:53 UTC 2016 - [email protected] + +- Security update to 11.2.202.637 (bsc#1004019): + * APSB16-32, CVE-2016-4273, CVE-2016-4286, CVE-2016-6981, + CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, + CVE-2016-6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990, + CVE-2016-6992 +- Fix update.sh to match new download page. +- Update EULA to version 23.0 (bsc#1003993). + +------------------------------------------------------------------- +Tue Sep 13 18:14:07 UTC 2016 - [email protected] + +- Security update to 11.2.202.635 (bsc#998589): + * APSB16-29, CVE-2016-4182, CVE-2016-4237, CVE-2016-4238, + CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, + CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, + CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, + CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, + CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, + CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, + CVE-2016-6931, CVE-2016-6932 + +------------------------------------------------------------------- +Fri Jul 29 11:44:50 UTC 2016 - [email protected] + +- Update description tags to reflect the fact that the stand-alone + Flash is no longer provided on x86_64 architectures (bnc#977664). + +------------------------------------------------------------------- +Tue Jul 12 15:00:31 UTC 2016 - [email protected] + +- Security update to 11.2.202.632 (bsc#988579, APSB16-25): + CVE-2016-4172, CVE-2016-4173, CVE-2016-4174, CVE-2016-4175, + CVE-2016-4176, CVE-2016-4177, CVE-2016-4178, CVE-2016-4179, + CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, + CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, + CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, + CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, + CVE-2016-4222, CVE-2016-4223, CVE-2016-4224, CVE-2016-4225, + CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, + CVE-2016-4230, CVE-2016-4231, CVE-2016-4232, CVE-2016-4233, + CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, + CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, + CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, + CVE-2016-4246, CVE-2016-4247, CVE-2016-4248, CVE-2016-4249 +- Supplementary script (update.sh) update: + * Update to the new web pages layout. + +------------------------------------------------------------------- +Fri Jun 17 06:59:22 UTC 2016 - [email protected] + +- Security update to 11.2.202.626 (bsc#984695): + * APSB16-18, CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, + CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, + CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, + CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137, + CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141, + CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145, + CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149, + CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, + CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, + CVE-2016-4171, CVE-2016-4126 + +------------------------------------------------------------------- +Thu May 12 11:07:30 UTC 2016 - [email protected] + +- Security update to 11.2.202.621 (bsc#979422): + * APSA16-02, CVE-2016-1096, CVE-2016-1097, CVE-2016-1098, + CVE-2016-1099, CVE-2016-1100, CVE-2016-1101, CVE-2016-1102, + CVE-2016-1103, CVE-2016-1104, CVE-2016-1105, CVE-2016-1106, + CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, + CVE-2016-4108, CVE-2016-4109, CVE-2016-4110, CVE-2016-4111, + CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115, + CVE-2016-4116, CVE-2016-4117, CVE-2016-4120, CVE-2016-4121, + CVE-2016-4160, CVE-2016-4161, CVE-2016-4162, CVE-2016-4163 + +------------------------------------------------------------------- +Thu Apr 7 15:25:11 CEST 2016 - [email protected] + +- Security update to 11.2.202.616 (bsc#974209): + * APSA16-01, APSB16-10, CVE-2016-1006, CVE-2016-1011, + CVE-2016-1012, CVE-2016-1013, CVE-2016-1014, CVE-2016-1015, + CVE-2016-1016, CVE-2016-1017, CVE-2016-1018, CVE-2016-1019, + CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, + CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, + CVE-2016-1028, CVE-2016-1029, CVE-2016-1030, CVE-2016-1031, + CVE-2016-1032, CVE-2016-1033 + +------------------------------------------------------------------- +Thu Mar 10 18:41:10 UTC 2016 - [email protected] + +- Security update to 11.2.202.577 (bsc#970547): + * APSB16-08, CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, + CVE-2016-0963, CVE-2016-0986, CVE-2016-0987, CVE-2016-0988, + CVE-2016-0989, CVE-2016-0990, CVE-2016-0991, CVE-2016-0992, + CVE-2016-0993, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, + CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000, + CVE-2016-1001, CVE-2016-1002, CVE-2016-1005, CVE-2016-1010 + +------------------------------------------------------------------- +Tue Feb 9 16:27:55 UTC 2016 - [email protected] + +- Security update to 11.2.202.569 (bsc#965901): + * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, + CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, + CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974, + CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, + CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982, + CVE-2016-0983, CVE-2016-0984, CVE-2016-0985 + +------------------------------------------------------------------- +Tue Dec 29 10:51:55 UTC 2015 - [email protected] + +- Security update to 11.2.202.559 (bsc#960317): + * APSB16-01, CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, + CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, + CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, + CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, + CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651 + +------------------------------------------------------------------- +Wed Dec 9 10:01:29 UTC 2015 - [email protected] + +- Security update to 11.2.202.554 (bsc#958324): + * APSB15-32, CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, + CVE-2015-8049, CVE-2015-8050, CVE-2015-8418, CVE-2015-8454, + CVE-2015-8455, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, + CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, + CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, + CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, + CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, + CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, + CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, + CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, + CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, + CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, + CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, + CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, + CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, + CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, + CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, + CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, + CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, + CVE-2015-8452, CVE-2015-8453 + +------------------------------------------------------------------- +Tue Nov 10 18:39:17 UTC 2015 - [email protected] + +- Security update to 11.2.202.548 (bsc#954512): + * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, + CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, + CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661, + CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, + CVE-2015-8044, CVE-2015-8046 + +------------------------------------------------------------------- +Fri Oct 16 10:35:34 UTC 2015 - [email protected] + +- Security update to 11.2.202.540 (bsc#950474): + * APSA15-05, CVE-2015-7645 + +------------------------------------------------------------------- +Tue Oct 13 16:14:38 UTC 2015 - [email protected] + +- Security update to 11.2.202.535 (bsc#950169): + * APSB15-25, CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, + CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630, + CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634, + CVE-2015-7643, CVE-2015-7644 + +------------------------------------------------------------------- +Tue Sep 22 08:23:33 UTC 2015 - [email protected] + +- Security update to 11.2.202.521 (bsc#946880): + * APSB15-23, CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, + CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, + CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, + CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, + CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, + CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682 + +------------------------------------------------------------------- +Tue Aug 11 15:58:28 UTC 2015 - [email protected] + +- Security update to 11.2.202.508 (bsc#941239): + * APSB15-19, CVE-2015-3107, CVE-2015-5124, CVE-2015-5125, + CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130, + CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, + CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, ++++ 745 more lines (skipped) ++++ between /dev/null ++++ and /work/SRC/openSUSE:13.1:NonFree:Update/.flash-player.4682.new/flash-player.changes New: ---- Flash_Player_23_0.pdf desktop.diff flash-player.changes flash-player.spec flashplayer.desktop flashplayer.png flashplayer_11.1.102.55_sa.x86_64.tar.bz2 flashplayer_11.2.202.643_sa.i386.tar.gz install_flash_player_11.2.202.643_linux.i386.tar.gz install_flash_player_11.2.202.643_linux.x86_64.tar.gz kcm_adobe_flash_player.desktop.patch mms.cfg update.sh ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ flash-player.spec ++++++ # # spec file for package flash-player # # Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via http://bugs.opensuse.org/ # %define build_standalone 1 Name: flash-player Version: 11.2.202.643 Release: 0 License: SUSE-NonFree Group: Productivity/Networking/Web/Browsers Url: http://get.adobe.com/flashplayer/ %ifarch %ix86 Summary: Adobe Flash Plugin and Standalone Player Source0: install_flash_player_%{version}_linux.i386.tar.gz Source1: flashplayer_%{version}_sa.i386.tar.gz %endif %ifarch x86_64 Summary: Adobe Flash Plugin Source0: install_flash_player_%{version}_linux.x86_64.tar.gz Source1: flashplayer_11.1.102.55_sa.x86_64.tar.bz2 %endif # License referenced from http://www.adobe.com/legal/licenses-terms.html Source2: http://wwwimages.adobe.com/content/dam/acom/en/legal/licenses-terms/pdf/Flash_Player_23_0.pdf Source4: flashplayer.desktop Source5: flashplayer.png Source6: mms.cfg Source99: update.sh NoSource: 99 # PATCH-FIX-OPENSUSE desktop.diff -- Fix desktop file to be GNOME compatible Patch0: desktop.diff # PATCH-FIX-OPENSUSE kcm_adobe_flash_player.desktop.patch [email protected] -- Make the KCM module X-KDE-System-Settings-Parent-Category entry compatible with newer KDE versions Patch1: kcm_adobe_flash_player.desktop.patch %if 0%{?suse_version} > 1100 BuildRequires: kde4-filesystem %endif %if 0%{?suse_version} BuildRequires: update-desktop-files %endif # Flash Player and the plugin dynamically opens that one and segfaults if not available (2008-11-12) %ifarch %ix86 Requires: libasound.so.2 Requires: libcurl.so.4 %endif %ifarch x86_64 Requires: libasound.so.2()(64bit) Requires: libcurl.so.4()(64bit) %endif Provides: flash-plugin = %{version} %if 0%{?suse_version} >= 1110 # flash 10 does not need libflashsupport and using it can cause device conflicts # just let flash talk with the default alsa plugin - bnc#539656 Provides: libflashsupport = 1.2 Obsoletes: libflashsupport <= 1.2 %ifarch x86_64 Provides: libflashsupport-32bit = 1.2 Obsoletes: libflashsupport-32bit <= 1.2 %endif %endif Provides: netscape-plugins Obsoletes: netscape-plugins BuildRoot: %{_tmppath}/%{name}-%{version}-build ExclusiveArch: %ix86 x86_64 %if 0%{!?_kde4_libdir:1} %define _kde4_libdir %{_libdir} %endif %if 0%{!?_kde4_datadir:1} %define _kde4_datadir %{_datadir} %endif %if 0%{!?_kde4_sharedir:1} %define _kde4_sharedir %{_kde4_datadir}/kde4 %endif %if 0%{!?_kde4_modulesdir:1} %define _kde4_modulesdir %{_kde4_libdir}/kde4 %endif %if 0%{!?_kde4_servicesdir:1} %define _kde4_servicesdir %{_kde4_sharedir}/services %endif %description This package contains Adobe's Flash Plugin for the supported Web browsers. On i586 platforms, a standalone flash player application is also included. %if 0%{?suse_version} > 1100 %package gnome Summary: Adobe Flash Player Settings Group: Productivity/Networking/Web/Browsers Requires: %{name} = %{version} Supplements: packageand(gnome-session:flash-player) %description gnome This package contains Adobe's Flash Player Settings for the GNOME desktop. %package kde4 Summary: Adobe Flash Player Settings Group: Productivity/Networking/Web/Browsers Requires: %{name} = %{version} Supplements: packageand(kdebase4-session:flash-player) %kde4_runtime_requires %description kde4 This package contains Adobe's Flash Player Settings for the KDE 4 desktop. %endif %prep %setup -q -c %{name}-%{version} -a 0 -b 1 %patch0 %patch1 mkdir EULA cp %{SOURCE2} EULA/ %build %install install -Dpm 0755 libflashplayer.so %{buildroot}%{_libdir}/browser-plugins/libflashplayer.so # bnc#761975 #install -m 644 -D %{SOURCE6} %{buildroot}/etc/adobe/mms.cfg mkdir -p %{buildroot}%{_datadir}/icons rm -rf usr/share/icons/hicolor/24x24 %if 0%{?suse_version} <= 1100 rm -rf usr/share/icons/hicolor/*/apps/flash-player-properties.png %endif cp -a usr/share/icons/* %{buildroot}%{_datadir}/icons %if 0%{?suse_version} > 1100 # KDE frontend install -Dpm 0755 usr/%{_lib}/kde4/kcm_adobe_flash_player.so %{buildroot}%{_kde4_modulesdir}/kcm_adobe_flash_player.so install -Dpm 0644 usr/share/kde4/services/kcm_adobe_flash_player.desktop %{buildroot}%{_kde4_servicesdir}/kcm_adobe_flash_player.desktop # GNOME frontend install -Dpm 0755 usr/bin/flash-player-properties %{buildroot}%{_bindir}/flash-player-properties install -Dpm 0644 usr/share/applications/flash-player-properties.desktop %{buildroot}%{_datadir}/applications/flash-player-properties.desktop %endif %if %build_standalone %if 0%{?suse_version} > 1030 %ifarch %ix86 if test -f install_flash_player_linux_sa/flashplayer ; then install -Dpm 0755 install_flash_player_linux_sa/flashplayer %{buildroot}%{_bindir}/flashplayer else install -Dpm 0755 flashplayer %{buildroot}%{_bindir}/flashplayer fi install -Dpm 0644 %{SOURCE4} %{buildroot}%{_datadir}/applications/flashplayer.desktop install -Dpm 0644 %{SOURCE5} %{buildroot}%{_datadir}/pixmaps/flashplayer.png %suse_update_desktop_file flashplayer %endif %endif %endif %if 0%{?suse_version} > 1100 %suse_update_desktop_file flash-player-properties %endif %post # This is an ugly hack: flash-player hard-requires SSE2. rpm nor zypp can # limit installation to SSE2 equipped systems only. We have to choose one # from two bad things: Install and let it crash or install and # deliberately break it. We do the second here. (bnc856386). if ! grep -q '^flags.*sse2' /proc/cpuinfo ; then rm %{_libdir}/browser-plugins/libflashplayer.so %if 0%{?suse_version} > 1030 %ifarch %ix86 rm %{_bindir}/flashplayer %endif %endif echo >&2 "Flash Player requires CPU with SSE2. It cannot work on your system." echo >&2 "Please uninstall it!" fi %files %defattr(-,root,root,-) %doc readme.txt EULA %{_libdir}/browser-plugins/libflashplayer.so #/etc/adobe/mms.cfg #%dir /etc/adobe %if 0%{?suse_version} > 1020 %{_datadir}/icons/hicolor/*x*/apps/flash-player-properties.png %endif %if %build_standalone %if 0%{?suse_version} > 1030 %ifarch %ix86 %{_bindir}/flashplayer %{_datadir}/applications/flashplayer.desktop %{_datadir}/pixmaps/flashplayer.png %endif %endif %endif %if 0%{?suse_version} > 1100 %files gnome %defattr(-,root,root,-) %{_bindir}/flash-player-properties %{_datadir}/applications/flash-player-properties.desktop %files kde4 %defattr(-,root,root,-) %{_kde4_modulesdir}/kcm_adobe_flash_player.so %{_kde4_servicesdir}/kcm_adobe_flash_player.desktop %endif %changelog ++++++ desktop.diff ++++++ --- usr/share/applications/flash-player-properties.desktop +++ usr/share/applications/flash-player-properties.desktop @@ -1,5 +1,6 @@ [Desktop Entry] Name=Adobe Flash Player +GenericName=Adobe Flash Player Settings Comment=Preferences for Adobe Flash Player Comment[bg]=Настройки за Adobe Flash Player Comment[ca]=Preferències quant a la Adobe Flash Player @@ -20,5 +21,5 @@ Terminal=false Type=Application StartupNotify=true -Categories=Settings;GNOME;GTK;X-GNOME-PersonalSettings; +Categories=Settings;Network;WebBrowser;GNOME;GTK;X-GNOME-PersonalSettings; NotShowIn=KDE; ++++++ flashplayer.desktop ++++++ [Desktop Entry] Type=Application Encoding=UTF-8 Name=FlashPlayer GenericName=Flash Standalone Player Comment=Flash Standalone Player Icon=flashplayer Exec=flashplayer Terminal=false Categories=GTK;Application;AudioVideo;Audio;Video;Player; MimeType=application/x-shockwave-flash; ++++++ kcm_adobe_flash_player.desktop.patch ++++++ --- usr/share/kde4/services/kcm_adobe_flash_player.desktop.orig 2011-08-03 09:35:44.000000000 +0300 +++ usr/share/kde4/services/kcm_adobe_flash_player.desktop 2011-08-27 22:00:25.800000030 +0300 @@ -8,7 +8,7 @@ X-KDE-Library=kcm_adobe_flash_player X-KDE-ParentApp=kcontrol -X-KDE-System-Settings-Parent-Category=personal +X-KDE-System-Settings-Parent-Category=personal-information X-KDE-Weight=10 Name=Adobe Flash Player ++++++ mms.cfg ++++++ EnableLinuxHWVideoDecode=1 ++++++ update.sh ++++++ #!/bin/bash # vim: sw=4 et # If you want to update more than one repository at once, set # FLASH_PLAYER_UPDATE_COMMON_DESC variable to a place in writable # directory. If the file exists, it will be used, otherwise it will be # created. if test -n "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then if test -f "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then . $FLASH_PLAYER_UPDATE_COMMON_DESC else echo -n >$FLASH_PLAYER_UPDATE_COMMON_DESC fi fi function cache_set() { if test -n "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then echo >>$FLASH_PLAYER_UPDATE_COMMON_DESC "$1=\"$2\"" fi } set -e if test -z "$UPDATE_EXISTS" ; then # Unknown status of UPDATE_EXISTS means no FLASH_PLAYER_UPDATE_COMMON_DESC t=$(mktemp -d XXXXXXX) mkdir ORIG_FLASH_SAVE mv *.tar.gz ORIG_FLASH_SAVE pushd $t &>/dev/null UPDATE_EXISTS=false tar xf ../ORIG_FLASH_SAVE/install_flash_player_11*_linux.i386.tar.gz libflashplayer.so md5sum libflashplayer.so > ORIG_FLASH rm libflashplayer.so # fetch the current download url download_url=$(curl -s 'https://get.adobe.com/flashplayer/download/?installer=FP_11.2_for_other_Linux_32-bit_(.tar.gz)_-_NPAPI&stype=2732&standalone=1' | egrep -o 'https*:\/\/fpdownload.adobe.com\/get\/flashplayer\/pdc\/11.*\/install_flash_player_11_linux.i386.tar.gz') echo "Trying download $download_url"; wget $download_url tar xf install_flash_player_11_linux.i386.tar.gz libflashplayer.so md5sum libflashplayer.so > NEW_FLASH if cmp -s ORIG_FLASH NEW_FLASH; then echo "no new update available" else echo "*** NEW flashplugin UPDATE AVAILABLE!" VERSION=$(strings libflashplayer.so | grep "LNX 11," | cut -d' ' -f2 | sed -e 's#,#.#g') echo "new version is $VERSION" download_url=$(echo $download_url | sed -e 's,i386,ARCH,') for arch in i386 x86_64; do wget -q $(echo $download_url | sed -e "s,ARCH,$arch,") mv install_flash_player_11_linux.$arch.tar.gz install_flash_player_${VERSION}_linux.$arch.tar.gz mv install_flash_player_${VERSION}_linux.$arch.tar.gz .. cache_set UPDATE_EXISTS "true" cache_set VERSION "$VERSION" cache_set INSTALL_FLASH_PLAYER_FILENAME_$arch install_flash_player_${VERSION}_linux.$arch.tar.gz done UPDATE_EXISTS=true fi for arch in i386; do if tar tf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz | grep -q -F install_flash_player_linux_sa/flashplayer ; then tar xf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz install_flash_player_linux_sa/flashplayer md5sum install_flash_player_linux_sa/flashplayer > ORIG_FLASH rm -r install_flash_player_linux_sa else tar xf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz flashplayer md5sum flashplayer > ORIG_FLASH rm flashplayer fi wget https://fpdownload.macromedia.com/pub/flashplayer/updaters/11/flashplayer_11_sa.$arch.tar.gz if tar xvf flashplayer_11_sa.$arch.tar.gz | grep -q -F install_flash_player_linux_sa/flashplayer ; then md5sum install_flash_player_linux_sa/flashplayer > NEW_FLASH else md5sum flashplayer > NEW_FLASH fi if cmp -s ORIG_FLASH NEW_FLASH; then echo "no new update available" if $UPDATE_EXISTS ; then "UPDATE WARNING: Update of install_flash_player exists but update of flashplayer does not." "UPDATE WARNING: You have to edit spec file manually!" fi else echo "*** NEW flashplayer UPDATE AVAILABLE!" if test -f install_flash_player_linux_sa/flashplayer ; then VERSION=$(strings install_flash_player_linux_sa/flashplayer | grep "LNX 11," | cut -d' ' -f2 | sed -e 's#,#.#g') else VERSION=$(strings flashplayer | grep "LNX 11," | cut -d' ' -f2 | sed -e 's#,#.#g') fi echo "new version is $VERSION" mv flashplayer_11_sa.$arch.tar.gz flashplayer_${VERSION}_sa.$arch.tar.gz mv flashplayer_${VERSION}_sa.$arch.tar.gz .. cache_set FLASH_PLAYER_FILENAME_$arch flashplayer_${VERSION}_sa.$arch.tar.gz fi done cd .. popd &>/dev/null rm -rf $t cache_set FLASH_PLAYER_DIRNAME $PWD if $UPDATE_EXISTS ; then rm -r ORIG_FLASH_SAVE else cache_set UPDATE_EXISTS false mv ORIG_FLASH_SAVE/* . rmdir ORIG_FLASH_SAVE exit 2 fi # Create changelog entry. echo -n "Please enter BSC# (number only${BSC:+, press Enter for \"$BSC\"}): " read BSC if test -z "$BSC" ; then echo >&2 "BSC is empty!" exit 1 fi cache_set BSC "$BSC" echo -n "Please enter Adobe Vulnerability identifier (including APSA/APSB): " read APSA if test -z "$APSA" ; then echo >&2 "APSA is empty!" fi cache_set APSA "$APSA" echo -n "Please enter list of CVE (\", \" separated): " read CVE if test -z "$CVE" ; then echo >&2 "CVE is empty!" exit 1 fi cache_set CVE "$CVE" osc vc -m "Security update to $VERSION (bsc#$BSC): * $(echo " $APSA, $CVE" | fmt -w 67 | tail -c +5)" else # Update was already done in another repository. if $UPDATE_EXISTS ; then # ./update.sh was already called in another directory. Reuse its output. rm *.tar.gz cp -a $FLASH_PLAYER_DIRNAME/$INSTALL_FLASH_PLAYER_FILENAME_i386 . cp -a $FLASH_PLAYER_DIRNAME/$INSTALL_FLASH_PLAYER_FILENAME_x86_64 . cp -a $FLASH_PLAYER_DIRNAME/$FLASH_PLAYER_FILENAME_i386 . sed -n '1p;1,/^-----/{/^-----/d;p}' <$FLASH_PLAYER_DIRNAME/flash-player.changes >flash-player.changes.add cat flash-player.changes.add flash-player.changes >flash-player.changes.new mv flash-player.changes.new flash-player.changes rm flash-player.changes.add else exit 2 fi fi sed -i -e "s,Version:.*,Version: $VERSION," flash-player.spec osc addremove echo "Done. Please call \"osc ci\"."
