empty root environment for testing specs
Empty package used as environment for local builds taking advantage of OBS as intelligent frontend for "build".
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:Akoellh/Testroot && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
zoo-2.10-CAN-2005-2349.patch | 0000001070 1.04 KB | |
zoo-2.10-security-infinite_loop.patch | 0000002599 2.54 KB | |
zoo-2.10-tempfile.patch | 0000000677 677 Bytes | |
zoo-fclose.patch | 0000000399 399 Bytes | |
zoo-gcc.patch | 0000000840 840 Bytes | |
zoo-return.patch | 0000002128 2.08 KB | |
zoo-security_parse.patch | 0000000452 452 Bytes | |
zoo-security_pathsize.patch | 0000000746 746 Bytes | |
zoo.changes | 0000004352 4.25 KB | |
zoo.patch | 0000003398 3.32 KB | |
zoo.spec | 0000002185 2.13 KB | |
zoo.tar.gz | 0000174518 170 KB |
Latest Revision
Axel Köllhofer (Akoellh)
committed
(revision 12)
- Cleanup spec file with spec-cleaner - build with PIE support. stack-protector is now default - zoo.patch: also include utime.h and unistd.h for some more prototypes to fix implicit warnings - Remove redundant %clean section and old specfile tags; reset Release number as it is autocontrolled by OBS anyhow. - refresh patches with fuzz=0 - zoo-fclose.patch : use fclose to close fd (bnc#523301) - fixed possible ZOO file decompression infinite loop DoS attack CVE-2007-1669 (security-infinite_loop.patch) [#271781] - fixed buffer overflow (security_parse.patch) [155371] - fixed security bug: buffer overflow when handling long filenames CVE-2006-0855 [#153057] - converted neededforbuild to BuildRequires - wrote clean section - enabled compilation with -fstack-protector - Don't strip binaries. - Use RPM_OPT_FLAGS. - Fix random return values.
Comments 0