Hello community,

here is the log from the commit of package flash-player.4682 for 
openSUSE:13.1:NonFree:Update checked in at 2016-10-27 21:49:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.1:NonFree:Update/flash-player.4682 (Old)
 and      /work/SRC/openSUSE:13.1:NonFree:Update/.flash-player.4682.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "flash-player.4682"

Changes:
--------
New Changes file:

--- /dev/null   2016-10-27 01:54:32.792041256 +0200
+++ 
/work/SRC/openSUSE:13.1:NonFree:Update/.flash-player.4682.new/flash-player.changes
  2016-10-27 21:49:53.000000000 +0200
@@ -0,0 +1,942 @@
+-------------------------------------------------------------------
+Wed Oct 26 18:44:52 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.643 (bsc#1007098):
+  * APSB16-36, CVE-2016-7855
+
+-------------------------------------------------------------------
+Tue Oct 11 18:09:53 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.637 (bsc#1004019):
+  * APSB16-32, CVE-2016-4273, CVE-2016-4286, CVE-2016-6981,
+    CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985,
+    CVE-2016-6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990,
+    CVE-2016-6992
+- Fix update.sh to match new download page.
+- Update EULA to version 23.0 (bsc#1003993).
+
+-------------------------------------------------------------------
+Tue Sep 13 18:14:07 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.635 (bsc#998589):
+  * APSB16-29, CVE-2016-4182, CVE-2016-4237, CVE-2016-4238,
+    CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275,
+    CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279,
+    CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283,
+    CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921,
+    CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925,
+    CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930,
+    CVE-2016-6931, CVE-2016-6932
+
+-------------------------------------------------------------------
+Fri Jul 29 11:44:50 UTC 2016 - [email protected]
+
+- Update description tags to reflect the fact that the stand-alone
+  Flash is no longer provided on x86_64 architectures (bnc#977664).
+
+-------------------------------------------------------------------
+Tue Jul 12 15:00:31 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.632 (bsc#988579, APSB16-25):
+    CVE-2016-4172, CVE-2016-4173, CVE-2016-4174, CVE-2016-4175,
+    CVE-2016-4176, CVE-2016-4177, CVE-2016-4178, CVE-2016-4179,
+    CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183,
+    CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187,
+    CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217,
+    CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221,
+    CVE-2016-4222, CVE-2016-4223, CVE-2016-4224, CVE-2016-4225,
+    CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229,
+    CVE-2016-4230, CVE-2016-4231, CVE-2016-4232, CVE-2016-4233,
+    CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237,
+    CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241,
+    CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245,
+    CVE-2016-4246, CVE-2016-4247, CVE-2016-4248, CVE-2016-4249
+- Supplementary script (update.sh) update:
+  * Update to the new web pages layout.
+
+-------------------------------------------------------------------
+Fri Jun 17 06:59:22 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.626 (bsc#984695):
+  * APSB16-18, CVE-2016-4122, CVE-2016-4123, CVE-2016-4124,
+    CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129,
+    CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133,
+    CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137,
+    CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141,
+    CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145,
+    CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149,
+    CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153,
+    CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166,
+    CVE-2016-4171, CVE-2016-4126
+
+-------------------------------------------------------------------
+Thu May 12 11:07:30 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.621 (bsc#979422):
+  * APSA16-02, CVE-2016-1096, CVE-2016-1097, CVE-2016-1098,
+    CVE-2016-1099, CVE-2016-1100, CVE-2016-1101, CVE-2016-1102,
+    CVE-2016-1103, CVE-2016-1104, CVE-2016-1105, CVE-2016-1106,
+    CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110,
+    CVE-2016-4108, CVE-2016-4109, CVE-2016-4110, CVE-2016-4111,
+    CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115,
+    CVE-2016-4116, CVE-2016-4117, CVE-2016-4120, CVE-2016-4121,
+    CVE-2016-4160, CVE-2016-4161, CVE-2016-4162, CVE-2016-4163
+
+-------------------------------------------------------------------
+Thu Apr  7 15:25:11 CEST 2016 - [email protected]
+
+- Security update to 11.2.202.616 (bsc#974209):
+  * APSA16-01, APSB16-10, CVE-2016-1006, CVE-2016-1011,
+    CVE-2016-1012, CVE-2016-1013, CVE-2016-1014, CVE-2016-1015,
+    CVE-2016-1016, CVE-2016-1017, CVE-2016-1018, CVE-2016-1019,
+    CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023,
+    CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027,
+    CVE-2016-1028, CVE-2016-1029, CVE-2016-1030, CVE-2016-1031,
+    CVE-2016-1032, CVE-2016-1033
+
+-------------------------------------------------------------------
+Thu Mar 10 18:41:10 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.577 (bsc#970547):
+  * APSB16-08, CVE-2016-0960, CVE-2016-0961, CVE-2016-0962,
+    CVE-2016-0963, CVE-2016-0986, CVE-2016-0987, CVE-2016-0988,
+    CVE-2016-0989, CVE-2016-0990, CVE-2016-0991, CVE-2016-0992,
+    CVE-2016-0993, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996,
+    CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000,
+    CVE-2016-1001, CVE-2016-1002, CVE-2016-1005, CVE-2016-1010
+
+-------------------------------------------------------------------
+Tue Feb  9 16:27:55 UTC 2016 - [email protected]
+
+- Security update to 11.2.202.569 (bsc#965901):
+  * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966,
+    CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970,
+    CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974,
+    CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978,
+    CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982,
+    CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
+
+-------------------------------------------------------------------
+Tue Dec 29 10:51:55 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.559 (bsc#960317):
+  * APSB16-01, CVE-2015-8459, CVE-2015-8460, CVE-2015-8634,
+    CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639,
+    CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643,
+    CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647,
+    CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651
+
+-------------------------------------------------------------------
+Wed Dec  9 10:01:29 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.554 (bsc#958324):
+  * APSB15-32, CVE-2015-8045, CVE-2015-8047, CVE-2015-8048,
+    CVE-2015-8049, CVE-2015-8050, CVE-2015-8418, CVE-2015-8454,
+    CVE-2015-8455, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057,
+    CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061,
+    CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065,
+    CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069,
+    CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402,
+    CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406,
+    CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410,
+    CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414,
+    CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419,
+    CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423,
+    CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427,
+    CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431,
+    CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435,
+    CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439,
+    CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443,
+    CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447,
+    CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451,
+    CVE-2015-8452, CVE-2015-8453
+
+-------------------------------------------------------------------
+Tue Nov 10 18:39:17 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.548 (bsc#954512):
+  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
+    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
+    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
+    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
+    CVE-2015-8044, CVE-2015-8046
+
+-------------------------------------------------------------------
+Fri Oct 16 10:35:34 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.540 (bsc#950474):
+  * APSA15-05, CVE-2015-7645
+
+-------------------------------------------------------------------
+Tue Oct 13 16:14:38 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.535 (bsc#950169):
+  * APSB15-25, CVE-2015-5569, CVE-2015-7625, CVE-2015-7626,
+    CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,
+    CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634,
+    CVE-2015-7643, CVE-2015-7644
+
+-------------------------------------------------------------------
+Tue Sep 22 08:23:33 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.521 (bsc#946880):
+  * APSB15-23, CVE-2015-5567, CVE-2015-5568, CVE-2015-5570,
+    CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574,
+    CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578,
+    CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582,
+    CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676,
+    CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682
+
+-------------------------------------------------------------------
+Tue Aug 11 15:58:28 UTC 2015 - [email protected]
+
+- Security update to 11.2.202.508 (bsc#941239):
+  * APSB15-19, CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
+    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
+    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
+    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
++++ 745 more lines (skipped)
++++ between /dev/null
++++ and 
/work/SRC/openSUSE:13.1:NonFree:Update/.flash-player.4682.new/flash-player.changes

New:
----
  Flash_Player_23_0.pdf
  desktop.diff
  flash-player.changes
  flash-player.spec
  flashplayer.desktop
  flashplayer.png
  flashplayer_11.1.102.55_sa.x86_64.tar.bz2
  flashplayer_11.2.202.643_sa.i386.tar.gz
  install_flash_player_11.2.202.643_linux.i386.tar.gz
  install_flash_player_11.2.202.643_linux.x86_64.tar.gz
  kcm_adobe_flash_player.desktop.patch
  mms.cfg
  update.sh

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ flash-player.spec ++++++
#
# spec file for package flash-player
#
# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.

# Please submit bugfixes or comments via http://bugs.opensuse.org/
#


%define build_standalone 1

Name:           flash-player
Version:        11.2.202.643
Release:        0
License:        SUSE-NonFree
Group:          Productivity/Networking/Web/Browsers
Url:            http://get.adobe.com/flashplayer/
%ifarch %ix86
Summary:        Adobe Flash Plugin and Standalone Player
Source0:        install_flash_player_%{version}_linux.i386.tar.gz
Source1:        flashplayer_%{version}_sa.i386.tar.gz
%endif
%ifarch x86_64
Summary:        Adobe Flash Plugin
Source0:        install_flash_player_%{version}_linux.x86_64.tar.gz
Source1:        flashplayer_11.1.102.55_sa.x86_64.tar.bz2
%endif
# License referenced from http://www.adobe.com/legal/licenses-terms.html
Source2:        
http://wwwimages.adobe.com/content/dam/acom/en/legal/licenses-terms/pdf/Flash_Player_23_0.pdf
Source4:        flashplayer.desktop
Source5:        flashplayer.png
Source6:        mms.cfg
Source99:       update.sh
NoSource:       99
# PATCH-FIX-OPENSUSE desktop.diff -- Fix desktop file to be GNOME compatible
Patch0:         desktop.diff
# PATCH-FIX-OPENSUSE kcm_adobe_flash_player.desktop.patch 
[email protected] -- Make the KCM module 
X-KDE-System-Settings-Parent-Category entry compatible with newer KDE versions
Patch1:         kcm_adobe_flash_player.desktop.patch
%if 0%{?suse_version} > 1100
BuildRequires:  kde4-filesystem
%endif
%if 0%{?suse_version}
BuildRequires:  update-desktop-files
%endif
# Flash Player and the plugin dynamically opens that one and segfaults if not 
available (2008-11-12)
%ifarch %ix86
Requires:       libasound.so.2
Requires:       libcurl.so.4
%endif
%ifarch x86_64
Requires:       libasound.so.2()(64bit)
Requires:       libcurl.so.4()(64bit)
%endif
Provides:       flash-plugin = %{version}
%if 0%{?suse_version} >= 1110
# flash 10 does not need libflashsupport and using it can cause device conflicts
# just let flash talk with the default alsa plugin - bnc#539656
Provides:       libflashsupport = 1.2
Obsoletes:      libflashsupport <= 1.2
%ifarch x86_64
Provides:       libflashsupport-32bit = 1.2
Obsoletes:      libflashsupport-32bit <= 1.2
%endif
%endif
Provides:       netscape-plugins
Obsoletes:      netscape-plugins
BuildRoot:      %{_tmppath}/%{name}-%{version}-build
ExclusiveArch:  %ix86 x86_64
%if 0%{!?_kde4_libdir:1}
%define _kde4_libdir %{_libdir}
%endif
%if 0%{!?_kde4_datadir:1}
%define _kde4_datadir %{_datadir}
%endif
%if 0%{!?_kde4_sharedir:1}
%define _kde4_sharedir %{_kde4_datadir}/kde4
%endif
%if 0%{!?_kde4_modulesdir:1}
%define _kde4_modulesdir %{_kde4_libdir}/kde4
%endif
%if 0%{!?_kde4_servicesdir:1}
%define _kde4_servicesdir %{_kde4_sharedir}/services
%endif

%description
This package contains Adobe's Flash Plugin for the supported Web
browsers. On i586 platforms, a standalone flash player application
is also included.

%if 0%{?suse_version} > 1100

%package gnome
Summary:        Adobe Flash Player Settings
Group:          Productivity/Networking/Web/Browsers
Requires:       %{name} = %{version}
Supplements:    packageand(gnome-session:flash-player)

%description gnome
This package contains Adobe's Flash Player Settings for the GNOME desktop.

%package kde4
Summary:        Adobe Flash Player Settings
Group:          Productivity/Networking/Web/Browsers
Requires:       %{name} = %{version}
Supplements:    packageand(kdebase4-session:flash-player)
%kde4_runtime_requires

%description kde4
This package contains Adobe's Flash Player Settings for the KDE 4 desktop.

%endif

%prep
%setup -q -c %{name}-%{version} -a 0 -b 1
%patch0
%patch1
mkdir EULA
cp %{SOURCE2} EULA/

%build

%install
install -Dpm 0755 libflashplayer.so 
%{buildroot}%{_libdir}/browser-plugins/libflashplayer.so
# bnc#761975
#install -m 644 -D %{SOURCE6} %{buildroot}/etc/adobe/mms.cfg

mkdir -p %{buildroot}%{_datadir}/icons
rm -rf usr/share/icons/hicolor/24x24
%if 0%{?suse_version} <= 1100
rm -rf usr/share/icons/hicolor/*/apps/flash-player-properties.png
%endif
cp -a usr/share/icons/* %{buildroot}%{_datadir}/icons

%if 0%{?suse_version} > 1100
# KDE frontend
install -Dpm 0755 usr/%{_lib}/kde4/kcm_adobe_flash_player.so 
%{buildroot}%{_kde4_modulesdir}/kcm_adobe_flash_player.so
install -Dpm 0644 usr/share/kde4/services/kcm_adobe_flash_player.desktop 
%{buildroot}%{_kde4_servicesdir}/kcm_adobe_flash_player.desktop
# GNOME frontend
install -Dpm 0755 usr/bin/flash-player-properties 
%{buildroot}%{_bindir}/flash-player-properties
install -Dpm 0644 usr/share/applications/flash-player-properties.desktop 
%{buildroot}%{_datadir}/applications/flash-player-properties.desktop
%endif

%if %build_standalone
%if 0%{?suse_version} > 1030
%ifarch %ix86
if test -f install_flash_player_linux_sa/flashplayer ; then
        install -Dpm 0755 install_flash_player_linux_sa/flashplayer 
%{buildroot}%{_bindir}/flashplayer
else
        install -Dpm 0755 flashplayer %{buildroot}%{_bindir}/flashplayer
fi
install -Dpm 0644 %{SOURCE4} 
%{buildroot}%{_datadir}/applications/flashplayer.desktop
install -Dpm 0644 %{SOURCE5} %{buildroot}%{_datadir}/pixmaps/flashplayer.png
%suse_update_desktop_file flashplayer
%endif
%endif
%endif

%if 0%{?suse_version} > 1100
%suse_update_desktop_file flash-player-properties
%endif

%post
# This is an ugly hack: flash-player hard-requires SSE2. rpm nor zypp can
# limit installation to SSE2 equipped systems only. We have to choose one
# from two bad things: Install and let it crash or install and
# deliberately break it. We do the second here. (bnc856386).
if ! grep -q '^flags.*sse2' /proc/cpuinfo ; then
        rm %{_libdir}/browser-plugins/libflashplayer.so
%if 0%{?suse_version} > 1030
%ifarch %ix86
        rm %{_bindir}/flashplayer
%endif
%endif
        echo >&2 "Flash Player requires CPU with SSE2. It cannot work on your 
system."
        echo >&2 "Please uninstall it!"
fi

%files
%defattr(-,root,root,-)
%doc readme.txt EULA
%{_libdir}/browser-plugins/libflashplayer.so
#/etc/adobe/mms.cfg
#%dir /etc/adobe
%if 0%{?suse_version} > 1020
%{_datadir}/icons/hicolor/*x*/apps/flash-player-properties.png
%endif
%if %build_standalone
%if 0%{?suse_version} > 1030
%ifarch %ix86
%{_bindir}/flashplayer
%{_datadir}/applications/flashplayer.desktop
%{_datadir}/pixmaps/flashplayer.png
%endif
%endif
%endif

%if 0%{?suse_version} > 1100

%files gnome
%defattr(-,root,root,-)
%{_bindir}/flash-player-properties
%{_datadir}/applications/flash-player-properties.desktop

%files kde4
%defattr(-,root,root,-)
%{_kde4_modulesdir}/kcm_adobe_flash_player.so
%{_kde4_servicesdir}/kcm_adobe_flash_player.desktop

%endif

%changelog
++++++ desktop.diff ++++++
--- usr/share/applications/flash-player-properties.desktop
+++ usr/share/applications/flash-player-properties.desktop
@@ -1,5 +1,6 @@
 [Desktop Entry]
 Name=Adobe Flash Player
+GenericName=Adobe Flash Player Settings
 Comment=Preferences for Adobe Flash Player
 Comment[bg]=Настройки за Adobe Flash Player
 Comment[ca]=Preferències quant a la Adobe Flash Player
@@ -20,5 +21,5 @@
 Terminal=false
 Type=Application
 StartupNotify=true
-Categories=Settings;GNOME;GTK;X-GNOME-PersonalSettings;
+Categories=Settings;Network;WebBrowser;GNOME;GTK;X-GNOME-PersonalSettings;
 NotShowIn=KDE;
++++++ flashplayer.desktop ++++++
[Desktop Entry]
Type=Application
Encoding=UTF-8
Name=FlashPlayer
GenericName=Flash Standalone Player
Comment=Flash Standalone Player
Icon=flashplayer
Exec=flashplayer
Terminal=false
Categories=GTK;Application;AudioVideo;Audio;Video;Player;
MimeType=application/x-shockwave-flash;
++++++ kcm_adobe_flash_player.desktop.patch ++++++
--- usr/share/kde4/services/kcm_adobe_flash_player.desktop.orig 2011-08-03 
09:35:44.000000000 +0300
+++ usr/share/kde4/services/kcm_adobe_flash_player.desktop      2011-08-27 
22:00:25.800000030 +0300
@@ -8,7 +8,7 @@
 X-KDE-Library=kcm_adobe_flash_player
 X-KDE-ParentApp=kcontrol
 
-X-KDE-System-Settings-Parent-Category=personal
+X-KDE-System-Settings-Parent-Category=personal-information
 X-KDE-Weight=10
 
 Name=Adobe Flash Player
++++++ mms.cfg ++++++
EnableLinuxHWVideoDecode=1 
++++++ update.sh ++++++
#!/bin/bash
# vim: sw=4 et

# If you want to update more than one repository at once, set
# FLASH_PLAYER_UPDATE_COMMON_DESC variable to a place in writable
# directory. If the file exists, it will be used, otherwise it will be
# created.
if test -n "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then
        if test -f "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then
                . $FLASH_PLAYER_UPDATE_COMMON_DESC
        else
                echo -n >$FLASH_PLAYER_UPDATE_COMMON_DESC
        fi
fi

function cache_set() {
if test -n "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then
    echo >>$FLASH_PLAYER_UPDATE_COMMON_DESC "$1=\"$2\""
fi
}

set -e

if test -z "$UPDATE_EXISTS" ; then
    # Unknown status of UPDATE_EXISTS means no FLASH_PLAYER_UPDATE_COMMON_DESC

    t=$(mktemp  -d XXXXXXX)

    mkdir ORIG_FLASH_SAVE
    mv *.tar.gz ORIG_FLASH_SAVE
    pushd $t &>/dev/null

    UPDATE_EXISTS=false

    tar xf ../ORIG_FLASH_SAVE/install_flash_player_11*_linux.i386.tar.gz 
libflashplayer.so
    md5sum libflashplayer.so > ORIG_FLASH
    rm libflashplayer.so
    # fetch the current download url
    download_url=$(curl -s 
'https://get.adobe.com/flashplayer/download/?installer=FP_11.2_for_other_Linux_32-bit_(.tar.gz)_-_NPAPI&stype=2732&standalone=1'
 | egrep  -o 
'https*:\/\/fpdownload.adobe.com\/get\/flashplayer\/pdc\/11.*\/install_flash_player_11_linux.i386.tar.gz')
    echo "Trying download $download_url";
    wget $download_url
    tar xf install_flash_player_11_linux.i386.tar.gz libflashplayer.so
    md5sum libflashplayer.so > NEW_FLASH

    if cmp -s ORIG_FLASH NEW_FLASH; then

        echo "no new update available"

    else
        echo "*** NEW flashplugin UPDATE AVAILABLE!"
        VERSION=$(strings libflashplayer.so | grep "LNX 11," | cut -d' ' -f2 | 
sed -e 's#,#.#g')
        echo "new version is $VERSION"
        download_url=$(echo $download_url | sed -e 's,i386,ARCH,')

        for arch in i386 x86_64; do
            wget -q $(echo $download_url | sed -e "s,ARCH,$arch,")
            mv install_flash_player_11_linux.$arch.tar.gz 
install_flash_player_${VERSION}_linux.$arch.tar.gz
            mv install_flash_player_${VERSION}_linux.$arch.tar.gz ..
            cache_set UPDATE_EXISTS "true"
            cache_set VERSION "$VERSION"
            cache_set INSTALL_FLASH_PLAYER_FILENAME_$arch 
install_flash_player_${VERSION}_linux.$arch.tar.gz
        done
        UPDATE_EXISTS=true
    fi

    for arch in i386; do
        if tar tf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz | grep -q -F 
install_flash_player_linux_sa/flashplayer ; then
            tar xf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz 
install_flash_player_linux_sa/flashplayer
            md5sum install_flash_player_linux_sa/flashplayer > ORIG_FLASH
            rm -r install_flash_player_linux_sa
        else
            tar xf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz flashplayer
            md5sum flashplayer > ORIG_FLASH
            rm flashplayer
        fi
        wget 
https://fpdownload.macromedia.com/pub/flashplayer/updaters/11/flashplayer_11_sa.$arch.tar.gz
        if tar xvf flashplayer_11_sa.$arch.tar.gz | grep -q -F 
install_flash_player_linux_sa/flashplayer ; then
            md5sum install_flash_player_linux_sa/flashplayer > NEW_FLASH
        else
            md5sum flashplayer > NEW_FLASH
        fi

        if cmp -s ORIG_FLASH NEW_FLASH; then

            echo "no new update available"

            if $UPDATE_EXISTS ; then
                "UPDATE WARNING: Update of install_flash_player exists but 
update of flashplayer does not."
                "UPDATE WARNING: You have to edit spec file manually!"
            fi
        else
            echo "*** NEW flashplayer UPDATE AVAILABLE!"
            if test -f install_flash_player_linux_sa/flashplayer ; then
                VERSION=$(strings install_flash_player_linux_sa/flashplayer | 
grep "LNX 11," | cut -d' ' -f2 | sed -e 's#,#.#g')
            else
                VERSION=$(strings flashplayer | grep "LNX 11," | cut -d' ' -f2 
| sed -e 's#,#.#g')
            fi
            echo "new version is $VERSION"
            mv flashplayer_11_sa.$arch.tar.gz 
flashplayer_${VERSION}_sa.$arch.tar.gz
            mv flashplayer_${VERSION}_sa.$arch.tar.gz ..
            cache_set FLASH_PLAYER_FILENAME_$arch 
flashplayer_${VERSION}_sa.$arch.tar.gz
        fi
    done

    cd ..
    popd &>/dev/null
    rm -rf $t

    cache_set FLASH_PLAYER_DIRNAME $PWD
    if $UPDATE_EXISTS ; then
        rm -r ORIG_FLASH_SAVE
    else
        cache_set UPDATE_EXISTS false
        mv ORIG_FLASH_SAVE/* .
        rmdir ORIG_FLASH_SAVE
        exit 2
    fi

    # Create changelog entry.
    echo -n "Please enter BSC# (number only${BSC:+, press Enter for \"$BSC\"}): 
"
    read BSC
    if test -z "$BSC" ; then
        echo >&2 "BSC is empty!"
        exit 1
    fi
    cache_set BSC "$BSC"

    echo -n "Please enter Adobe Vulnerability identifier (including APSA/APSB): 
"
    read APSA
    if test -z "$APSA" ; then
        echo >&2 "APSA is empty!"
    fi
    cache_set APSA "$APSA"

    echo -n "Please enter list of CVE (\", \" separated): "
    read CVE
    if test -z "$CVE" ; then
        echo >&2 "CVE is empty!"
        exit 1
    fi
    cache_set CVE "$CVE"

    osc vc -m "Security update to $VERSION (bsc#$BSC):
  * $(echo "    $APSA, $CVE" | fmt -w 67 | tail -c +5)"

else # Update was already done in another repository.

    if $UPDATE_EXISTS ; then
        # ./update.sh was already called in another directory. Reuse its output.

        rm *.tar.gz
        cp -a $FLASH_PLAYER_DIRNAME/$INSTALL_FLASH_PLAYER_FILENAME_i386 .
        cp -a $FLASH_PLAYER_DIRNAME/$INSTALL_FLASH_PLAYER_FILENAME_x86_64 .
        cp -a $FLASH_PLAYER_DIRNAME/$FLASH_PLAYER_FILENAME_i386 .

        sed -n '1p;1,/^-----/{/^-----/d;p}' 
<$FLASH_PLAYER_DIRNAME/flash-player.changes >flash-player.changes.add
        cat flash-player.changes.add flash-player.changes 
>flash-player.changes.new
        mv flash-player.changes.new flash-player.changes
        rm flash-player.changes.add
    else
        exit 2
    fi
fi

sed -i -e "s,Version:.*,Version:        $VERSION," flash-player.spec

osc addremove

echo "Done. Please call \"osc ci\"."

Reply via email to