From 50041dbf9ae0b1b0cfed11f7864ea0df61a96855 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Tue, 29 Oct 2019 20:09:01 +0000 Subject: Tue Oct 29 20:09:01 UTC 2019 a/aaa_elflibs-15.0-x86_64-14.txz: Rebuilt. Upgraded: libglib-2.0.so.0.6200.2, libgmodule-2.0.so.0.6200.2, libgobject-2.0.so.0.6200.2, libgthread-2.0.so.0.6200.2. Added: libgomp.so.1.0.0. a/kernel-firmware-20191029_4065643-noarch-1.txz: Upgraded. a/kernel-generic-4.19.81-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.81-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.81-x86_64-1.txz: Upgraded. ap/sudo-1.8.29-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.81-x86-1.txz: Upgraded. d/python-setuptools-41.6.0-x86_64-1.txz: Upgraded. k/kernel-source-4.19.81-noarch-1.txz: Upgraded. l/harfbuzz-2.6.3-x86_64-1.txz: Upgraded. n/samba-4.11.2-x86_64-1.txz: Upgraded. This update fixes bugs and these security issues: Client code can return filenames containing path separators. Samba AD DC check password script does not receive the full password. User with "get changes" permission can crash AD DC LDAP server via dirsync. For more information, see: https://www.samba.org/samba/security/CVE-2019-10218.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218 https://www.samba.org/samba/security/CVE-2019-14833.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14833 https://www.samba.org/samba/security/CVE-2019-14847.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847 (* Security fix *) x/libglvnd-1.2.0-x86_64-4.txz: Rebuilt. Applied upstream patches to fix EGL/eglplatform.h. x/xorg-server-1.20.5-x86_64-3.txz: Rebuilt. #define EGL_NO_X11 to fix glamor build against libglvnd-1.2.0. x/xorg-server-xephyr-1.20.5-x86_64-3.txz: Rebuilt. x/xorg-server-xnest-1.20.5-x86_64-3.txz: Rebuilt. x/xorg-server-xvfb-1.20.5-x86_64-3.txz: Rebuilt. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. --- .../6f52473dac08c44b081b792874b4ce73122096da.patch | 28 ++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 source/x/libglvnd/patches/6f52473dac08c44b081b792874b4ce73122096da.patch (limited to 'source/x/libglvnd/patches/6f52473dac08c44b081b792874b4ce73122096da.patch') diff --git a/source/x/libglvnd/patches/6f52473dac08c44b081b792874b4ce73122096da.patch b/source/x/libglvnd/patches/6f52473dac08c44b081b792874b4ce73122096da.patch new file mode 100644 index 000000000..a11f7742c --- /dev/null +++ b/source/x/libglvnd/patches/6f52473dac08c44b081b792874b4ce73122096da.patch @@ -0,0 +1,28 @@ +From 6f52473dac08c44b081b792874b4ce73122096da Mon Sep 17 00:00:00 2001 +From: Eric Engestrom +Date: Mon, 30 Sep 2019 16:06:42 +0100 +Subject: [PATCH] include: install GL headers when GL is enabled + +A typo made it depend on EGL instead. + +Fixes: ab9b5fcc3bf90064418f ("Install the GL/GLES/GLX/EGL header files.") +--- + include/Makefile.am | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/include/Makefile.am b/include/Makefile.am +index 1e33d2d..3d81d17 100644 +--- a/include/Makefile.am ++++ b/include/Makefile.am +@@ -39,7 +39,7 @@ EGL_HEADER_FILES = \ + EGL/eglext.h \ + EGL/eglplatform.h + +-if ENABLE_EGL_HEADERS ++if ENABLE_GL_HEADERS + nobase_include_HEADERS += $(GL_HEADER_FILES) + else + noinst_HEADERS += $(GL_HEADER_FILES) +-- +2.22.0 + -- cgit v1.2.3