Add patch to fix CVE-2022-45939
This commit is contained in:
parent
b7ecd22927
commit
d21b022666
@ -26,6 +26,8 @@ Patch3: emacs-libdir-vs-systemd.patch
|
|||||||
Patch4: emacs-pdmp-fingerprint.patch
|
Patch4: emacs-pdmp-fingerprint.patch
|
||||||
Patch5: emacs-configure-c99-1.patch
|
Patch5: emacs-configure-c99-1.patch
|
||||||
Patch6: emacs-configure-c99-2.patch
|
Patch6: emacs-configure-c99-2.patch
|
||||||
|
# CVE-2022-45939
|
||||||
|
Patch7: https://git.savannah.gnu.org/cgit/emacs.git/patch/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51#./fixed-ctags-local-command-execute-vulnerability.patch
|
||||||
|
|
||||||
BuildRequires: gcc
|
BuildRequires: gcc
|
||||||
BuildRequires: atk-devel
|
BuildRequires: atk-devel
|
||||||
@ -208,6 +210,7 @@ cp -p %{SOURCE3} lib/
|
|||||||
%patch4 -p1 -b .pdmp-fingerprint
|
%patch4 -p1 -b .pdmp-fingerprint
|
||||||
%patch5 -p1
|
%patch5 -p1
|
||||||
%patch6 -p1
|
%patch6 -p1
|
||||||
|
%patch7 -p1 -b .ctags-local-execution-cve
|
||||||
autoconf
|
autoconf
|
||||||
|
|
||||||
grep -v "tetris.elc" lisp/Makefile.in > lisp/Makefile.in.new \
|
grep -v "tetris.elc" lisp/Makefile.in > lisp/Makefile.in.new \
|
||||||
@ -517,6 +520,7 @@ desktop-file-validate %{buildroot}/%{_datadir}/applications/*.desktop
|
|||||||
%changelog
|
%changelog
|
||||||
* Tue Nov 1 2022 Dan Čermák <dan.cermak@cgc-instruments.com> - 1:28.2-1
|
* Tue Nov 1 2022 Dan Čermák <dan.cermak@cgc-instruments.com> - 1:28.2-1
|
||||||
- New upstream release 28.2, fixes rhbz#2126048
|
- New upstream release 28.2, fixes rhbz#2126048
|
||||||
|
- Add patch to fix CVE-2022-45939, fixes rhbz#2149381
|
||||||
|
|
||||||
* Fri Dec 23 2022 Florian Weimer <fweimer@redhat.com> - 1:28.1-4
|
* Fri Dec 23 2022 Florian Weimer <fweimer@redhat.com> - 1:28.1-4
|
||||||
- C99 compatibility fixes for the configure script
|
- C99 compatibility fixes for the configure script
|
||||||
|
9293
fixed-ctags-local-command-execute-vulnerability.patch
Normal file
9293
fixed-ctags-local-command-execute-vulnerability.patch
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user