Package: rpm / 4.11.3-1.1
Metadata
Package | Version | Patches format |
---|---|---|
rpm | 4.11.3-1.1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
lua compat.patch | (download) |
lib/rpmliblua.c |
1 1 + 0 - 0 ! |
avoid undefined functions with lua 5.2 |
do not link libpython.patch | (download) |
python/Makefile.am |
12 6 + 6 - 0 ! |
avoid linking with libpython This only introduces (useless) dependency on all supported python versions, while the linking itself is not needed. |
kfreebsd.patch | (download) |
autodeps/kfreebsd.prov |
61 61 + 0 - 0 ! |
add kfreebsd support |
hurd.patch | (download) |
autodeps/gnu.prov |
61 61 + 0 - 0 ! |
add hurd support |
installplatform verbose.patch | (download) |
installplatform |
1 1 + 0 - 0 ! |
verbose installplatform Just make installplatform to ease debugging problems with creatin platform files. |
rpmdb in home.patch | (download) |
macros.in |
4 3 + 1 - 0 ! |
move default rpmdb path to user home |
debian disable rpm.patch | (download) |
configure.ac |
2 2 + 0 - 0 ! |
rpm is not default package manager on debian In Debian, rpm should be used to install packages, but rather as a tool to work with rpm packages or as a helper in alien. Because of this we protect complain, when user tries to install a package. This warning can be hidden by --force-debian. |
fix directories.patch | (download) |
Makefile.am |
6 3 + 3 - 0 ! |
fix installation directories - Do not install rpm to /bin/. - Setup default directories so that source RPMs rebuilt on Debian get the right directories and also that builds occur in /usr/src/rpm - Fix statedir and init.d patch |
tempfile.patch | (download) |
scripts/vpkg-provides.sh |
24 12 + 12 - 0 ! |
use the debian standard (and safe) mechanism of generating temporary files |
no linux gate.so dependancy.patch | (download) |
autodeps/linux.req |
4 2 + 2 - 0 ! |
no linux-gate.so dependency If we rebuild an rpm, don't generate a dependancy on linux-gate.so as that is a virtual shared library generated by 2.6 kernels so that can decide upon the best mechanism to transition from user to kernelspace |
autogen cleanup.patch | (download) |
autogen.sh |
24 24 + 0 - 0 ! |
delete some crap after running autogen. |
lua libname.patch | (download) |
configure.ac |
2 1 + 1 - 0 ! |
in debian, lua library is called lua5.2. |
rpm 4.10.90 rpmlib filesystem check.patch | (download) |
lib/depends.c |
107 106 + 1 - 0 ! |
add fedora compatible rpm builtin provides |
fix python multiarch include.patch | (download) |
configure.ac |
4 2 + 2 - 0 ! |
fix python include issues due to multiarch. . rpm (4.10.1-2.1ubuntu1) raring; urgency=low . * debian/patches/fix-python-multiarch-include.patch: Fix python multiarch include issue that causes FTBFS. |
rpm 4.11.2 double separator warning.patch | (download) |
build/parseReqs.c |
7 5 + 2 - 0 ! |
reduce the double separator spec parse error into a warning (#1065563) See https://bugzilla.redhat.com/show_bug.cgi?id=1065563 |
CVE 2014 8118.patch | (download) |
lib/cpio.c |
3 3 + 0 - 0 ! |
limit the length of the file name to a reasonable value It was found that RPM could encounter an integer overflow, leading to a stack-based overflow, while parsing a crafted CPIO header in the payload section of an RPM file. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. |
CVE 2013 6435.patch | (download) |
lib/fsm.c |
7 6 + 1 - 0 ! |
create the file with mode 0 It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation. |