Hello community,

here is the log from the commit of package pax-utils for openSUSE:Factory 
checked in at 2019-07-11 13:15:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/pax-utils (Old)
 and      /work/SRC/openSUSE:Factory/.pax-utils.new.4615 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "pax-utils"

Thu Jul 11 13:15:58 2019 rev:23 rq:713853 version:1.2.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/pax-utils/pax-utils.changes      2018-01-22 
16:21:18.158120573 +0100
+++ /work/SRC/openSUSE:Factory/.pax-utils.new.4615/pax-utils.changes    
2019-07-11 13:16:11.190809107 +0200
@@ -1,0 +2,22 @@
+Mon Jul  1 14:44:19 UTC 2019 - Wolfgang Frisch <[email protected]>
+
+- Update to 1.2.4.
+- Removed patches that have since been committed to upstream (1.2.3):
+  - 0001-dumpelf-check-for-invalid-section-entry-sizes.patch
+    
https://github.com/gentoo/pax-utils/commit/4609f57a690b4a5670baeb93167dab5300d07d4e
+  - 0002-dumpelf-check-for-invalid-program-headers.patch
+    
https://github.com/gentoo/pax-utils/commit/18ded0e30ee5a84260cceb80d818b9c21ade4c76
+  - 0003-dumpelf-check-for-invalid-notes.patch
+    
https://github.com/gentoo/pax-utils/commit/10a9643d90a1ba6058a66066803fac6cf43f6917
+  - 0004-scanelf-check-range-of-hash-bucket.patch
+    
https://github.com/gentoo/pax-utils/commit/e577c5b7e230c52e5fc4fa40e4e9014c634b3c1d
+- Changes since 1.2.2:
+  - paxldso: properly decode the flags bits in the cache 
+    This fixes handling of multiple ABIs for a single arch like x86/x86_64/x32
+or mips o32/n32/n64.  It also fixes decoding of arm float libs.
+  - dumpelf: add support for dumping notes 
+  - dumpelf: add support for prelink sections
+  - scanmacho: fix 126 byte limit on -E option
+  - security fixes (mentioned above)
+
+-------------------------------------------------------------------

Old:
----
  0001-dumpelf-check-for-invalid-section-entry-sizes.patch
  0002-dumpelf-check-for-invalid-program-headers.patch
  0003-dumpelf-check-for-invalid-notes.patch
  0004-scanelf-check-range-of-hash-bucket.patch
  pax-utils-1.2.2.tar.xz

New:
----
  pax-utils-1.2.4.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ pax-utils.spec ++++++
--- /var/tmp/diff_new_pack.kYEkH2/_old  2019-07-11 13:16:11.794808917 +0200
+++ /var/tmp/diff_new_pack.kYEkH2/_new  2019-07-11 13:16:11.798808915 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package pax-utils
 #
-# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,23 +12,19 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
 
 Name:           pax-utils
-Version:        1.2.2
+Version:        1.2.4
 Release:        0
 Summary:        Tools to Check ELF Files for Security Relevant Properties
-License:        GPL-2.0+
+License:        GPL-2.0-or-later
 Group:          Productivity/Security
 Url:            http://www.gentoo.org/proj/en/hardened/pax-utils.xml
-Source:         http://dev.gentoo.org/~vapier/dist/pax-utils-%{version}.tar.xz
+Source:         
https://ftp.halifax.rwth-aachen.de/gentoo/distfiles/pax-utils-%{version}.tar.xz
 # backports
-Patch0:         0001-dumpelf-check-for-invalid-section-entry-sizes.patch
-Patch1:         0002-dumpelf-check-for-invalid-program-headers.patch
-Patch2:         0003-dumpelf-check-for-invalid-notes.patch
-Patch3:         0004-scanelf-check-range-of-hash-bucket.patch
 # openSUSE patches
 Patch20:        pax-utils-handle-lib64.patch
 BuildRequires:  libcap-devel

++++++ pax-utils-1.2.2.tar.xz -> pax-utils-1.2.4.tar.xz ++++++
++++ 30068 lines of diff (skipped)


Reply via email to