Hello community,

here is the log from the commit of package flash-player.4808 for 
openSUSE:13.2:NonFree:Update checked in at 2016-03-11 10:50:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:NonFree:Update/flash-player.4808 (Old)
 and      /work/SRC/openSUSE:13.2:NonFree:Update/.flash-player.4808.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "flash-player.4808"

Changes:
--------
New Changes file:

--- /dev/null   2016-01-27 19:41:03.648095915 +0100
+++ 
/work/SRC/openSUSE:13.2:NonFree:Update/.flash-player.4808.new/flash-player.changes
  2016-03-11 10:50:28.000000000 +0100
@@ -0,0 +1,846 @@
+-------------------------------------------------------------------
+Thu Mar 10 18:41:10 UTC 2016 - astie...@suse.com
+
+- Security update to 11.2.202.577 (bsc#970547):
+  * APSB16-08, CVE-2016-0960, CVE-2016-0961, CVE-2016-0962,
+    CVE-2016-0963, CVE-2016-0986, CVE-2016-0987, CVE-2016-0988,
+    CVE-2016-0989, CVE-2016-0990, CVE-2016-0991, CVE-2016-0992,
+    CVE-2016-0993, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996,
+    CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000,
+    CVE-2016-1001, CVE-2016-1002, CVE-2016-1005, CVE-2016-1010
+
+-------------------------------------------------------------------
+Tue Feb  9 16:27:55 UTC 2016 - sbra...@suse.com
+
+- Security update to 11.2.202.569 (bsc#965901):
+  * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966,
+    CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970,
+    CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974,
+    CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978,
+    CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982,
+    CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
+
+-------------------------------------------------------------------
+Tue Dec 29 10:51:55 UTC 2015 - meiss...@suse.com
+
+- Security update to 11.2.202.559 (bsc#960317):
+  * APSB16-01, CVE-2015-8459, CVE-2015-8460, CVE-2015-8634,
+    CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639,
+    CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643,
+    CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647,
+    CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651
+
+-------------------------------------------------------------------
+Wed Dec  9 10:01:29 UTC 2015 - meiss...@suse.com
+
+- Security update to 11.2.202.554 (bsc#958324):
+  * APSB15-32, CVE-2015-8045, CVE-2015-8047, CVE-2015-8048,
+    CVE-2015-8049, CVE-2015-8050, CVE-2015-8418, CVE-2015-8454,
+    CVE-2015-8455, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057,
+    CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061,
+    CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065,
+    CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069,
+    CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402,
+    CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406,
+    CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410,
+    CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414,
+    CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419,
+    CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423,
+    CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427,
+    CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431,
+    CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435,
+    CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439,
+    CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443,
+    CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447,
+    CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451,
+    CVE-2015-8452, CVE-2015-8453
+
+-------------------------------------------------------------------
+Tue Nov 10 18:39:17 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.548 (bsc#954512):
+  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
+    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
+    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
+    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
+    CVE-2015-8044, CVE-2015-8046
+
+-------------------------------------------------------------------
+Fri Oct 16 10:35:34 UTC 2015 - astie...@suse.com
+
+- Security update to 11.2.202.540 (bsc#950474):
+  * APSA15-05, CVE-2015-7645
+
+-------------------------------------------------------------------
+Tue Oct 13 16:14:38 UTC 2015 - astie...@suse.com
+
+- Security update to 11.2.202.535 (bsc#950169):
+  * APSB15-25, CVE-2015-5569, CVE-2015-7625, CVE-2015-7626,
+    CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,
+    CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634,
+    CVE-2015-7643, CVE-2015-7644
+
+-------------------------------------------------------------------
+Tue Sep 22 08:23:33 UTC 2015 - meiss...@suse.com
+
+- Security update to 11.2.202.521 (bsc#946880):
+  * APSB15-23, CVE-2015-5567, CVE-2015-5568, CVE-2015-5570,
+    CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574,
+    CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578,
+    CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582,
+    CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676,
+    CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682
+
+-------------------------------------------------------------------
+Tue Aug 11 15:58:28 UTC 2015 - abergm...@suse.com
+
+- Security update to 11.2.202.508 (bsc#941239):
+  * APSB15-19, CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
+    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
+    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
+    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
+    CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548,
+    CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552,
+    CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
+    CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560,
+    CVE-2015-5561, CVE-2015-5562, CVE-2015-5563
+
+-------------------------------------------------------------------
+Thu Jul 16 12:38:03 UTC 2015 - astie...@suse.com
+
+- Security update to 11.2.202.491 (bsc#937752):
+  * APSA15-04, APSB15-18, CVE-2015-5122, CVE-2015-5123
+
+-------------------------------------------------------------------
+Wed Jul  8 09:48:43 UTC 2015 - astie...@suse.com
+
+- Security update to 11.2.202.481 (bsc#937339):
+  * APSA15-03, CVE-2015-5119
+  * APSB15-16, CVE-2014-0578, CVE-2015-3097, CVE-2015-3114,
+    CVE-2015-3115, CVE-2015-3116, CVE-2015-3117, CVE-2015-3118,
+    CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122,
+    CVE-2015-3123, CVE-2015-3124, CVE-2015-3125, CVE-2015-3126,
+    CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130,
+    CVE-2015-3131, CVE-2015-3132, CVE-2015-3133, CVE-2015-3134,
+    CVE-2015-3135, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428,
+    CVE-2015-4429, CVE-2015-4430, CVE-2015-4431, CVE-2015-4432,
+    CVE-2015-4433, CVE-2015-5116, CVE-2015-5117, CVE-2015-5118
+
+-------------------------------------------------------------------
+Tue Jun 23 15:59:10 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.468 (bsc#935701):
+  * APSB15-14, CVE-2015-3113
+
+-------------------------------------------------------------------
+Tue Jun  9 16:23:26 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.466 (bsc#934088):
+  * APSB15-11, CVE-2015-3096, CVE-2015-3098, CVE-2015-3099,
+    CVE-2015-3100, CVE-2015-3102, CVE-2015-3103, CVE-2015-3104, 
+    CVE-2015-3105, CVE-2015-3106, CVE-2015-3107, CVE-2015-3108
+- update.sh: Use the new download URL.
+
+-------------------------------------------------------------------
+Wed May 13 13:08:01 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.460 (bsc#930677):
+  * APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078,
+    CVE-2015-3079, CVE-2015-3080, CVE-2015-3081, CVE-2015-3082,
+    CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086,
+    CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090,
+    CVE-2015-3091, CVE-2015-3092, CVE-2015-3093
+
+-------------------------------------------------------------------
+Tue Apr 14 18:23:31 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.457 (bsc#927089):
+  * APSB15-06, CVE-2015-0346, CVE-2015-0347, CVE-2015-0348,
+    CVE-2015-0349, CVE-2015-0350, CVE-2015-0351, CVE-2015-0352,
+    CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0356,
+    CVE-2015-0357, CVE-2015-0358, CVE-2015-0359, CVE-2015-0360,
+    CVE-2015-3038, CVE-2015-3039, CVE-2015-3040, CVE-2015-3041,
+    CVE-2015-3042, CVE-2015-3043, CVE-2015-3044
+
+-------------------------------------------------------------------
+Thu Mar 12 16:08:11 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.451 (bsc#922033):
+  * APSB15-05, CVE-2015-0332, CVE-2015-0333, CVE-2015-0334,
+    CVE-2015-0335, CVE-2015-0336, CVE-2015-0337, CVE-2015-0338,
+    CVE-2015-0339, CVE-2015-0340, CVE-2015-0341, CVE-2015-0342
+- Improve update.sh:
+  * format changes
+  * support for reuse of update data in other directory
+
+-------------------------------------------------------------------
+Fri Feb  6 13:36:09 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.442 (bsc#915918):
+  * APSB15-04, CVE-2015-0313, CVE-2015-0314, CVE-2015-0315,
+    CVE-2015-0316, CVE-2015-0317, CVE-2015-0318, CVE-2015-0319,
+    CVE-2015-0320, CVE-2015-0321, CVE-2015-0322, CVE-2015-0323,
+    CVE-2015-0324, CVE-2015-0325, CVE-2015-0326, CVE-2015-0327,
+    CVE-2015-0328, CVE-2015-0329, CVE-2015-0330, CVE-2015-0331
+- Re-enable flashplayer executable binary for i386.
+
+-------------------------------------------------------------------
+Mon Jan 26 15:57:09 UTC 2015 - sbra...@suse.com
+
+- Security update to 11.2.202.440 (bsc#914463):
+  * APSA15-01, CVE-2015-0311
+- Update of flashplayer (executable binary) for i386 is not
+  available. Disabled!
+
+-------------------------------------------------------------------
+Thu Jan 22 17:41:46 UTC 2015 - sbra...@suse.com
+
++++ 649 more lines (skipped)
++++ between /dev/null
++++ and 
/work/SRC/openSUSE:13.2:NonFree:Update/.flash-player.4808.new/flash-player.changes

New:
----
  Flash%20Player_14.0.pdf
  desktop.diff
  flash-player.changes
  flash-player.spec
  flashplayer.desktop
  flashplayer.png
  flashplayer_11.1.102.55_sa.x86_64.tar.bz2
  flashplayer_11.2.202.577_sa.i386.tar.gz
  install_flash_player_11.2.202.577_linux.i386.tar.gz
  install_flash_player_11.2.202.577_linux.x86_64.tar.gz
  kcm_adobe_flash_player.desktop.patch
  mms.cfg
  update.sh

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ flash-player.spec ++++++
#
# spec file for package flash-player
#
# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.

# Please submit bugfixes or comments via http://bugs.opensuse.org/
#


%define build_standalone 1

Name:           flash-player
Version:        11.2.202.577
Release:        0
Summary:        Adobe Flash Plugin and Standalone Player
License:        SUSE-NonFree
Group:          Productivity/Networking/Web/Browsers
Url:            http://get.adobe.com/flashplayer/
%ifarch %ix86
Source0:        install_flash_player_%{version}_linux.i386.tar.gz
Source1:        flashplayer_%{version}_sa.i386.tar.gz
%endif
%ifarch x86_64
Source0:        install_flash_player_%{version}_linux.x86_64.tar.gz
Source1:        flashplayer_11.1.102.55_sa.x86_64.tar.bz2
%endif
# License referenced from http://www.adobe.com/legal/licenses-terms.html
Source2:        
http://wwwimages.adobe.com/content/dam/Adobe/en/legal/licenses-terms/pdf/Flash%20Player_14.0.pdf
Source4:        flashplayer.desktop
Source5:        flashplayer.png
Source6:        mms.cfg
Source99:       update.sh
NoSource:       99
# PATCH-FIX-OPENSUSE desktop.diff -- Fix desktop file to be GNOME compatible
Patch0:         desktop.diff
# PATCH-FIX-OPENSUSE kcm_adobe_flash_player.desktop.patch 
asterios.dra...@gmail.com -- Make the KCM module 
X-KDE-System-Settings-Parent-Category entry compatible with newer KDE versions
Patch1:         kcm_adobe_flash_player.desktop.patch
%if 0%{?suse_version} > 1100
BuildRequires:  kde4-filesystem
%endif
%if 0%{?suse_version}
BuildRequires:  update-desktop-files
%endif
# Flash Player and the plugin dynamically opens that one and segfaults if not 
available (2008-11-12)
%ifarch %ix86
Requires:       libasound.so.2
Requires:       libcurl.so.4
%endif
%ifarch x86_64
Requires:       libasound.so.2()(64bit)
Requires:       libcurl.so.4()(64bit)
%endif
Provides:       flash-plugin = %{version}
%if 0%{?suse_version} >= 1110
# flash 10 does not need libflashsupport and using it can cause device conflicts
# just let flash talk with the default alsa plugin - bnc#539656
Provides:       libflashsupport = 1.2
Obsoletes:      libflashsupport <= 1.2
%ifarch x86_64
Provides:       libflashsupport-32bit = 1.2
Obsoletes:      libflashsupport-32bit <= 1.2
%endif
%endif
Provides:       netscape-plugins
Obsoletes:      netscape-plugins
BuildRoot:      %{_tmppath}/%{name}-%{version}-build
ExclusiveArch:  %ix86 x86_64
%if 0%{!?_kde4_libdir:1}
%define _kde4_libdir %{_libdir}
%endif
%if 0%{!?_kde4_datadir:1}
%define _kde4_datadir %{_datadir}
%endif
%if 0%{!?_kde4_sharedir:1}
%define _kde4_sharedir %{_kde4_datadir}/kde4
%endif
%if 0%{!?_kde4_modulesdir:1}
%define _kde4_modulesdir %{_kde4_libdir}/kde4
%endif
%if 0%{!?_kde4_servicesdir:1}
%define _kde4_servicesdir %{_kde4_sharedir}/services
%endif

%description
This package contains Adobe's Flash Plugin for the supported Web
browsers in addition to a standalone flash player application.

%if 0%{?suse_version} > 1100

%package gnome
Summary:        Adobe Flash Plugin and Standalone Player Settings
Group:          Productivity/Networking/Web/Browsers
Requires:       %{name} = %{version}
Supplements:    packageand(gnome-session:flash-player)

%description gnome
This package contains Adobe's Flash Plugin Settings for the GNOME desktop.

%package kde4
Summary:        Adobe Flash Plugin and Standalone Player Settings
Group:          Productivity/Networking/Web/Browsers
Requires:       %{name} = %{version}
Supplements:    packageand(kdebase4-session:flash-player)
%kde4_runtime_requires

%description kde4
This package contains Adobe's Flash Plugin Settings for the KDE 4 desktop.

%endif

%prep
%setup -q -c %{name}-%{version} -a 0 -b 1
%patch0
%patch1
cp %{SOURCE2} .
mkdir EULA
mv Flash%20Player_14.0.pdf EULA/Flash\ Player_14.0.pdf

%build

%install
install -Dpm 0755 libflashplayer.so 
%{buildroot}%{_libdir}/browser-plugins/libflashplayer.so
# bnc#761975
#install -m 644 -D %{SOURCE6} %{buildroot}/etc/adobe/mms.cfg

mkdir -p %{buildroot}%{_datadir}/icons
rm -rf usr/share/icons/hicolor/24x24
%if 0%{?suse_version} <= 1100
rm -rf usr/share/icons/hicolor/*/apps/flash-player-properties.png
%endif
cp -a usr/share/icons/* %{buildroot}%{_datadir}/icons

%if 0%{?suse_version} > 1100
# KDE frontend
install -Dpm 0755 usr/%{_lib}/kde4/kcm_adobe_flash_player.so 
%{buildroot}%{_kde4_modulesdir}/kcm_adobe_flash_player.so
install -Dpm 0644 usr/share/kde4/services/kcm_adobe_flash_player.desktop 
%{buildroot}%{_kde4_servicesdir}/kcm_adobe_flash_player.desktop
# GNOME frontend
install -Dpm 0755 usr/bin/flash-player-properties 
%{buildroot}%{_bindir}/flash-player-properties
install -Dpm 0644 usr/share/applications/flash-player-properties.desktop 
%{buildroot}%{_datadir}/applications/flash-player-properties.desktop
%endif

%if %build_standalone
%if 0%{?suse_version} > 1030
%ifarch %ix86
if test -f install_flash_player_linux_sa/flashplayer ; then
        install -Dpm 0755 install_flash_player_linux_sa/flashplayer 
%{buildroot}%{_bindir}/flashplayer
else
        install -Dpm 0755 flashplayer %{buildroot}%{_bindir}/flashplayer
fi
install -Dpm 0644 %{SOURCE4} 
%{buildroot}%{_datadir}/applications/flashplayer.desktop
install -Dpm 0644 %{SOURCE5} %{buildroot}%{_datadir}/pixmaps/flashplayer.png
%suse_update_desktop_file flashplayer
%endif
%endif
%endif

%if 0%{?suse_version} > 1100
%suse_update_desktop_file flash-player-properties
%endif

%post
# This is an ugly hack: flash-player hard-requires SSE2. rpm nor zypp can
# limit installation to SSE2 equipped systems only. We have to choose one
# from two bad things: Install and let it crash or install and
# deliberately break it. We do the second here. (bnc856386).
if ! grep -q '^flags.*sse2' /proc/cpuinfo ; then
        rm %{_libdir}/browser-plugins/libflashplayer.so
%if 0%{?suse_version} > 1030
%ifarch %ix86
        rm %{_bindir}/flashplayer
%endif
%endif
        echo >&2 "Flash Player requires CPU with SSE2. It cannot work on your 
system."
        echo >&2 "Please uninstall it!"
fi

%files
%defattr(-,root,root,-)
%doc readme.txt EULA
%{_libdir}/browser-plugins/libflashplayer.so
#/etc/adobe/mms.cfg
#%dir /etc/adobe
%if 0%{?suse_version} > 1020
%{_datadir}/icons/hicolor/*x*/apps/flash-player-properties.png
%endif
%if %build_standalone
%if 0%{?suse_version} > 1030
%ifarch %ix86
%{_bindir}/flashplayer
%{_datadir}/applications/flashplayer.desktop
%{_datadir}/pixmaps/flashplayer.png
%endif
%endif
%endif

%if 0%{?suse_version} > 1100

%files gnome
%defattr(-,root,root,-)
%{_bindir}/flash-player-properties
%{_datadir}/applications/flash-player-properties.desktop

%files kde4
%defattr(-,root,root,-)
%{_kde4_modulesdir}/kcm_adobe_flash_player.so
%{_kde4_servicesdir}/kcm_adobe_flash_player.desktop

%endif

%changelog
++++++ desktop.diff ++++++
--- usr/share/applications/flash-player-properties.desktop
+++ usr/share/applications/flash-player-properties.desktop
@@ -1,5 +1,6 @@
 [Desktop Entry]
 Name=Adobe Flash Player
+GenericName=Adobe Flash Player Settings
 Comment=Preferences for Adobe Flash Player
 Comment[bg]=Настройки за Adobe Flash Player
 Comment[ca]=Preferències quant a la Adobe Flash Player
@@ -20,5 +21,5 @@
 Terminal=false
 Type=Application
 StartupNotify=true
-Categories=Settings;GNOME;GTK;X-GNOME-PersonalSettings;
+Categories=Settings;Network;WebBrowser;GNOME;GTK;X-GNOME-PersonalSettings;
 NotShowIn=KDE;
++++++ flashplayer.desktop ++++++
[Desktop Entry]
Type=Application
Encoding=UTF-8
Name=FlashPlayer
GenericName=Flash Standalone Player
Comment=Flash Standalone Player
Icon=flashplayer
Exec=flashplayer
Terminal=false
Categories=GTK;Application;AudioVideo;Audio;Video;Player;
MimeType=application/x-shockwave-flash;
++++++ kcm_adobe_flash_player.desktop.patch ++++++
--- usr/share/kde4/services/kcm_adobe_flash_player.desktop.orig 2011-08-03 
09:35:44.000000000 +0300
+++ usr/share/kde4/services/kcm_adobe_flash_player.desktop      2011-08-27 
22:00:25.800000030 +0300
@@ -8,7 +8,7 @@
 X-KDE-Library=kcm_adobe_flash_player
 X-KDE-ParentApp=kcontrol
 
-X-KDE-System-Settings-Parent-Category=personal
+X-KDE-System-Settings-Parent-Category=personal-information
 X-KDE-Weight=10
 
 Name=Adobe Flash Player
++++++ mms.cfg ++++++
EnableLinuxHWVideoDecode=1 
++++++ update.sh ++++++
#!/bin/bash
# vim: sw=4 et

# If you want to update more than one repository at once, set
# FLASH_PLAYER_UPDATE_COMMON_DESC variable to a place in writable
# directory. If the file exists, it will be used, otherwise it will be
# created.
if test -n "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then
        if test -f "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then
                . $FLASH_PLAYER_UPDATE_COMMON_DESC
        else
                echo -n >$FLASH_PLAYER_UPDATE_COMMON_DESC
        fi
fi

function cache_set() {
if test -n "$FLASH_PLAYER_UPDATE_COMMON_DESC" ; then
    echo >>$FLASH_PLAYER_UPDATE_COMMON_DESC "$1=\"$2\""
fi
}

set -e

if test -z "$UPDATE_EXISTS" ; then
    # Unknown status of UPDATE_EXISTS means no FLASH_PLAYER_UPDATE_COMMON_DESC

    t=$(mktemp  -d XXXXXXX)

    mkdir ORIG_FLASH_SAVE
    mv *.tar.gz ORIG_FLASH_SAVE
    pushd $t &>/dev/null

    UPDATE_EXISTS=false

    tar xf ../ORIG_FLASH_SAVE/install_flash_player_11*_linux.i386.tar.gz 
libflashplayer.so
    md5sum libflashplayer.so > ORIG_FLASH
    rm libflashplayer.so
    # fetch the current download url
    download_url=$(curl -s 
'http://get.adobe.com/flashplayer/download/?installer=Flash_Player_11.2_for_other_Linux_%28.tar.gz%29_32-bit&standalone=1'
 | egrep  -o 
'https*:\/\/fpdownload.adobe.com\/get\/flashplayer\/pdc\/11.*\/install_flash_player_11_linux.i386.tar.gz')
    echo "Trying download $download_url";
    wget $download_url
    tar xf install_flash_player_11_linux.i386.tar.gz libflashplayer.so
    md5sum libflashplayer.so > NEW_FLASH

    if cmp -s ORIG_FLASH NEW_FLASH; then

        echo "no new update available"

    else
        echo "*** NEW flashplugin UPDATE AVAILABLE!"
        VERSION=$(strings libflashplayer.so | grep "LNX 11," | cut -d' ' -f2 | 
sed -e 's#,#.#g')
        echo "new version is $VERSION"
        download_url=$(echo $download_url | sed -e 's,i386,ARCH,')

        for arch in i386 x86_64; do
            wget -q $(echo $download_url | sed -e "s,ARCH,$arch,")
            mv install_flash_player_11_linux.$arch.tar.gz 
install_flash_player_${VERSION}_linux.$arch.tar.gz
            mv install_flash_player_${VERSION}_linux.$arch.tar.gz ..
            cache_set UPDATE_EXISTS "true"
            cache_set VERSION "$VERSION"
            cache_set INSTALL_FLASH_PLAYER_FILENAME_$arch 
install_flash_player_${VERSION}_linux.$arch.tar.gz
        done
        UPDATE_EXISTS=true
    fi

    for arch in i386; do
        if tar tf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz | grep -q -F 
install_flash_player_linux_sa/flashplayer ; then
            tar xf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz 
install_flash_player_linux_sa/flashplayer
            md5sum install_flash_player_linux_sa/flashplayer > ORIG_FLASH
            rm -r install_flash_player_linux_sa
        else
            tar xf ../ORIG_FLASH_SAVE/flashplayer_*_sa.$arch.tar.gz flashplayer
            md5sum flashplayer > ORIG_FLASH
            rm flashplayer
        fi
        wget 
https://fpdownload.macromedia.com/pub/flashplayer/updaters/11/flashplayer_11_sa.$arch.tar.gz
        if tar xvf flashplayer_11_sa.$arch.tar.gz | grep -q -F 
install_flash_player_linux_sa/flashplayer ; then
            md5sum install_flash_player_linux_sa/flashplayer > NEW_FLASH
        else
            md5sum flashplayer > NEW_FLASH
        fi

        if cmp -s ORIG_FLASH NEW_FLASH; then

            echo "no new update available"

            if $UPDATE_EXISTS ; then
                "UPDATE WARNING: Update of install_flash_player exists but 
update of flashplayer does not."
                "UPDATE WARNING: You have to edit spec file manually!"
            fi
        else
            echo "*** NEW flashplayer UPDATE AVAILABLE!"
            if test -f install_flash_player_linux_sa/flashplayer ; then
                VERSION=$(strings install_flash_player_linux_sa/flashplayer | 
grep "LNX 11," | cut -d' ' -f2 | sed -e 's#,#.#g')
            else
                VERSION=$(strings flashplayer | grep "LNX 11," | cut -d' ' -f2 
| sed -e 's#,#.#g')
            fi
            echo "new version is $VERSION"
            mv flashplayer_11_sa.$arch.tar.gz 
flashplayer_${VERSION}_sa.$arch.tar.gz
            mv flashplayer_${VERSION}_sa.$arch.tar.gz ..
            cache_set FLASH_PLAYER_FILENAME_$arch 
flashplayer_${VERSION}_sa.$arch.tar.gz
        fi
    done

    cd ..
    popd &>/dev/null
    rm -rf $t

    cache_set FLASH_PLAYER_DIRNAME $PWD
    if $UPDATE_EXISTS ; then
        rm -r ORIG_FLASH_SAVE
    else
        cache_set UPDATE_EXISTS false
        mv ORIG_FLASH_SAVE/* .
        rmdir ORIG_FLASH_SAVE
        exit 2
    fi

    # Create changelog entry.
    echo -n "Please enter BSC# (number only${BSC:+, press Enter for \"$BSC\"}): 
"
    read BSC
    if test -z "$BSC" ; then
        echo >&2 "BSC is empty!"
        exit 1
    fi
    cache_set BSC "$BSC"

    echo -n "Please enter Adobe Vulnerability identifier (including APSA/APSB): 
"
    read APSA
    if test -z "$APSA" ; then
        echo >&2 "APSA is empty!"
    fi
    cache_set APSA "$APSA"

    echo -n "Please enter list of CVE (\", \" separated): "
    read CVE
    if test -z "$CVE" ; then
        echo >&2 "CVE is empty!"
        exit 1
    fi
    cache_set CVE "$CVE"

    osc vc -m "Security update to $VERSION (bsc#$BSC):
  * $(echo "    $APSA, $CVE" | fmt -w 67 | tail -c +5)"

else # Update was already done in another repository.

    if $UPDATE_EXISTS ; then
        # ./update.sh was already called in another directory. Reuse its output.

        rm *.tar.gz
        cp -a $FLASH_PLAYER_DIRNAME/$INSTALL_FLASH_PLAYER_FILENAME_i386 .
        cp -a $FLASH_PLAYER_DIRNAME/$INSTALL_FLASH_PLAYER_FILENAME_x86_64 .
        cp -a $FLASH_PLAYER_DIRNAME/$FLASH_PLAYER_FILENAME_i386 .

        sed -n '1p;1,/^-----/{/^-----/d;p}' 
<$FLASH_PLAYER_DIRNAME/flash-player.changes >flash-player.changes.add
        cat flash-player.changes.add flash-player.changes 
>flash-player.changes.new
        mv flash-player.changes.new flash-player.changes
        rm flash-player.changes.add
    else
        exit 2
    fi
fi

sed -i -e "s,Version:.*,Version:        $VERSION," flash-player.spec

osc addremove

echo "Done. Please call \"osc ci\"."

Reply via email to