From 3132a8e569f853ce4c74500653381a93592b08a4 Mon Sep 17 00:00:00 2001 From: Willy Sudiarto Raharjo Date: Sat, 16 Jul 2016 23:01:22 +0700 Subject: system/p7zip: Updated for version 16.02. Signed-off-by: Willy Sudiarto Raharjo --- system/p7zip/p7zip.SlackBuild | 19 ++----------------- 1 file changed, 2 insertions(+), 17 deletions(-) (limited to 'system/p7zip/p7zip.SlackBuild') diff --git a/system/p7zip/p7zip.SlackBuild b/system/p7zip/p7zip.SlackBuild index e9eb5b372c..e21a3b0709 100644 --- a/system/p7zip/p7zip.SlackBuild +++ b/system/p7zip/p7zip.SlackBuild @@ -23,8 +23,8 @@ # ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PRGNAM=p7zip -VERSION=${VERSION:-9.20.1} -BUILD=${BUILD:-2} +VERSION=${VERSION:-16.02} +BUILD=${BUILD:-1} TAG=${TAG:-_SBo} if [ -z "$ARCH" ]; then @@ -72,21 +72,6 @@ find -L . \ \( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \ -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \; -# patch to fix security issues : -# -# CVE-2015-1038: -# p7zip 9.20.1 allows remote attackers to write to arbitrary files via a symlink attack in an archive. -# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1038 -# https://sourceforge.net/p/p7zip/bugs/147/#2f9c -# -# CVE-2016-2335: -# 7zip UDF CInArchive::ReadFileItem Code Execution Vulnerability -# http://www.talosintel.com/reports/TALOS-2016-0094/ -# https://sourceforge.net/p/p7zip/discussion/383043/thread/9d0fb86b/#1dba -# -patch -Np1 < $CWD/CVE-2015-1038.patch -patch -Np1 < $CWD/CVE-2016-2335.patch - make all3 \ OPTFLAGS="$SLKCFLAGS" \ DEST_HOME=/usr \ -- cgit v1.2.3