Hello community,

here is the log from the commit of package signing-party for openSUSE:Factory 
checked in at 2019-06-17 10:34:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/signing-party (Old)
 and      /work/SRC/openSUSE:Factory/.signing-party.new.4811 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "signing-party"

Mon Jun 17 10:34:49 2019 rev:5 rq:710221 version:2.10

Changes:
--------
--- /work/SRC/openSUSE:Factory/signing-party/signing-party.changes      
2019-05-03 22:47:47.119956374 +0200
+++ /work/SRC/openSUSE:Factory/.signing-party.new.4811/signing-party.changes    
2019-06-17 10:34:52.833217994 +0200
@@ -1,0 +2,9 @@
+Sun Jun  9 19:40:13 UTC 2019 - Sebastian Wagner <sebix+novell....@sebix.at>
+
+- remove cve-2019-11627.patchm included in tarball.
+- update to version 2.10-1:
+  * gpg-key2ps: Security fix for CVE-2018-15599: unsafe shell call enabling
+    shell injection via a User ID.  Use Perl's (core) module Encode.pm instead
+    of shelling out to `iconv`. (Closes: #928256.)
+
+-------------------------------------------------------------------

Old:
----
  cve-2019-11627.patch
  signing-party-2.9.tar.gz

New:
----
  signing-party-2.10.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ signing-party.spec ++++++
--- /var/tmp/diff_new_pack.ZKpXVc/_old  2019-06-17 10:34:53.429217697 +0200
+++ /var/tmp/diff_new_pack.ZKpXVc/_new  2019-06-17 10:34:53.433217695 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           signing-party
-Version:        2.9
+Version:        2.10
 Release:        0
 Summary:        GPG Tools
 License:        GPL-2.0-or-later
@@ -26,8 +26,6 @@
 Source:         
http://ftp.debian.org/debian/pool/main/s/signing-party/signing-party_%{version}.orig.tar.gz#/%{name}-%{version}.tar.gz
 # PATCH-FIX-OPENSUSE caff-manpage.patch [bnc#722626]
 Patch1:         caff-manpage.patch
-# PATCH-FIX-UPSTREAM cve-2019-11627.patch boo#1134040
-Patch2:         cve-2019-11627.patch
 Requires:       %{_sbindir}/sendmail
 Requires:       gpg
 Requires:       perl
@@ -85,7 +83,6 @@
 %prep
 %setup -q -n signing-party-%{version}
 %patch1 -p1
-%patch2 -p1
 
 %build
 %if 0%{?suse_version} > 1320

++++++ signing-party-2.9.tar.gz -> signing-party-2.10.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/signing-party-2.9/debian/changelog 
new/signing-party-2.10/debian/changelog
--- old/signing-party-2.9/debian/changelog      2019-03-01 15:40:38.000000000 
+0100
+++ new/signing-party-2.10/debian/changelog     2019-05-01 12:22:19.000000000 
+0200
@@ -1,3 +1,11 @@
+signing-party (2.10-1) unstable; urgency=high
+
+  * gpg-key2ps: Security fix for CVE-2018-15599: unsafe shell call enabling
+    shell injection via a User ID.  Use Perl's (core) module Encode.pm instead
+    of shelling out to `iconv`. (Closes: #928256.)
+
+ -- Guilhem Moulin <guil...@debian.org>  Wed, 01 May 2019 12:21:59 +0200
+
 signing-party (2.9-1) unstable; urgency=medium
 
   * gpglist:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/signing-party-2.9/gpg-key2ps/gpg-key2ps 
new/signing-party-2.10/gpg-key2ps/gpg-key2ps
--- old/signing-party-2.9/gpg-key2ps/gpg-key2ps 2019-03-01 15:40:38.000000000 
+0100
+++ new/signing-party-2.10/gpg-key2ps/gpg-key2ps        2019-05-01 
12:22:19.000000000 +0200
@@ -9,6 +9,7 @@
 #
 
 use strict;
+use Encode ();
 use Getopt::Long;
 
 my $version = '@@VERSION@@';
@@ -267,7 +268,7 @@
        }
        # user ids
        s/\\x(\p{AHex}{2})/ chr(hex($1)) /ge;
-       $_ = `echo "$_" | iconv -c -f utf-8 -t latin1`;
+       $_ = Encode::encode("latin1", Encode::decode_utf8($_));
        s/^uid:[^:r]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:([^:]*):.*/     
($1) uid/;
        # revoked user id
        if (s/^uid:r[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:[^:]*:([^:]*):.*/ 
($1) revuid/) {


Reply via email to