|
|
@ -5,7 +5,7 @@ Summary: GNU Emacs text editor
|
|
|
|
Name: emacs
|
|
|
|
Name: emacs
|
|
|
|
Epoch: 1
|
|
|
|
Epoch: 1
|
|
|
|
Version: 27.2
|
|
|
|
Version: 27.2
|
|
|
|
Release: 10%{?dist}.inferit
|
|
|
|
Release: 8%{?dist}.1.inferit
|
|
|
|
License: GPLv3+ and CC0-1.0
|
|
|
|
License: GPLv3+ and CC0-1.0
|
|
|
|
URL: http://www.gnu.org/software/emacs/
|
|
|
|
URL: http://www.gnu.org/software/emacs/
|
|
|
|
Source0: https://ftp.gnu.org/gnu/emacs/emacs-%{version}.tar.xz
|
|
|
|
Source0: https://ftp.gnu.org/gnu/emacs/emacs-%{version}.tar.xz
|
|
|
@ -33,8 +33,6 @@ Patch6: emacs-etags-local-command-injection-vulnerability.patch
|
|
|
|
Patch7: emacs-htmlfontify-command-injection-vulnerability.patch
|
|
|
|
Patch7: emacs-htmlfontify-command-injection-vulnerability.patch
|
|
|
|
Patch8: emacs-ruby-mode-local-command-injection-vulnerability.patch
|
|
|
|
Patch8: emacs-ruby-mode-local-command-injection-vulnerability.patch
|
|
|
|
Patch9: emacs-ob-latex-command-injection-vulnerability.patch
|
|
|
|
Patch9: emacs-ob-latex-command-injection-vulnerability.patch
|
|
|
|
Patch10: emacs-org-link-expand-abbrev-unsafe-elisp.patch
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
BuildRequires: gcc
|
|
|
|
BuildRequires: gcc
|
|
|
|
BuildRequires: atk-devel
|
|
|
|
BuildRequires: atk-devel
|
|
|
|
BuildRequires: cairo-devel
|
|
|
|
BuildRequires: cairo-devel
|
|
|
@ -77,6 +75,7 @@ BuildRequires: jansson-devel
|
|
|
|
BuildRequires: systemd-devel
|
|
|
|
BuildRequires: systemd-devel
|
|
|
|
|
|
|
|
|
|
|
|
BuildRequires: gtk3-devel
|
|
|
|
BuildRequires: gtk3-devel
|
|
|
|
|
|
|
|
BuildRequires: webkit2gtk3-devel
|
|
|
|
|
|
|
|
|
|
|
|
BuildRequires: gnupg2
|
|
|
|
BuildRequires: gnupg2
|
|
|
|
|
|
|
|
|
|
|
@ -202,7 +201,6 @@ Development header files for Emacs.
|
|
|
|
%patch7 -p1 -b .htmlfontify-command-injection-vulnerability
|
|
|
|
%patch7 -p1 -b .htmlfontify-command-injection-vulnerability
|
|
|
|
%patch8 -p1 -b .ruby-mode-local-command-injection-vulnerability
|
|
|
|
%patch8 -p1 -b .ruby-mode-local-command-injection-vulnerability
|
|
|
|
%patch9 -p1 -b .ob-latex-command-injection-vulnerability
|
|
|
|
%patch9 -p1 -b .ob-latex-command-injection-vulnerability
|
|
|
|
%patch10 -p1 -b .org-link-expand-abbrev-unsafe-elisp
|
|
|
|
|
|
|
|
autoconf
|
|
|
|
autoconf
|
|
|
|
|
|
|
|
|
|
|
|
# We prefer our emacs.desktop file
|
|
|
|
# We prefer our emacs.desktop file
|
|
|
@ -255,7 +253,7 @@ ln -s ../configure .
|
|
|
|
|
|
|
|
|
|
|
|
%configure --with-dbus --with-gif --with-jpeg --with-png --with-rsvg \
|
|
|
|
%configure --with-dbus --with-gif --with-jpeg --with-png --with-rsvg \
|
|
|
|
--with-tiff --with-xft --with-xpm --with-x-toolkit=gtk3 --with-gpm=no \
|
|
|
|
--with-tiff --with-xft --with-xpm --with-x-toolkit=gtk3 --with-gpm=no \
|
|
|
|
--with-modules --with-harfbuzz --with-cairo --with-json
|
|
|
|
--with-xwidgets --with-modules --with-harfbuzz --with-cairo --with-json
|
|
|
|
make bootstrap
|
|
|
|
make bootstrap
|
|
|
|
%{setarch} %make_build
|
|
|
|
%{setarch} %make_build
|
|
|
|
cd ..
|
|
|
|
cd ..
|
|
|
@ -493,24 +491,17 @@ rm %{buildroot}%{_datadir}/icons/hicolor/scalable/mimetypes/emacs-document23.svg
|
|
|
|
%{_includedir}/emacs-module.h
|
|
|
|
%{_includedir}/emacs-module.h
|
|
|
|
|
|
|
|
|
|
|
|
%changelog
|
|
|
|
%changelog
|
|
|
|
* Tue Sep 10 2024 Sergey Cherevko <s.cherevko@msvsphere-os.ru> - 1:27.2-10.inferit
|
|
|
|
|
|
|
|
- Update to 27.2-10
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* Fri Aug 23 2024 Jacek Migacz <jmigacz@redhat.com> - 1:27.2-10
|
|
|
|
|
|
|
|
- org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code (CVE-2024-39331)
|
|
|
|
|
|
|
|
- Disable xwidgets (RHEL-33447)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* Thu Aug 10 2023 Sergey Cherevko <s.cherevko@msvsphere.ru> - 1:27.2-8.1.inferit
|
|
|
|
* Thu Aug 10 2023 Sergey Cherevko <s.cherevko@msvsphere.ru> - 1:27.2-8.1.inferit
|
|
|
|
- Added Russian description for ArcMenu and gnome-software
|
|
|
|
- Added Russian description for ArcMenu and gnome-software
|
|
|
|
- Rebuilt for MSVSphere 9.2
|
|
|
|
- Rebuilt for MSVSphere 9.2
|
|
|
|
|
|
|
|
|
|
|
|
* Sun Apr 02 2023 Jacek Migacz <jmigacz@redhat.com> - 1:27.2-9
|
|
|
|
* Tue Apr 4 2023 Jacek Migacz <jmigacz@redhat.com> - 1:27.2-8.1
|
|
|
|
- Fix etags local command injection vulnerability (#2175190)
|
|
|
|
- Fix etags local command injection vulnerability (#2184369)
|
|
|
|
- Fix htmlfontify.el command injection vulnerability (#2175179)
|
|
|
|
- Fix htmlfontify.el command injection vulnerability (#2184368)
|
|
|
|
- Fix ruby-mode.el local command injection vulnerability (#2175142)
|
|
|
|
- Fix ruby-mode.el local command injection vulnerability (#2184367)
|
|
|
|
- Fix ob-latex.el command injection vulnerability (#2180590)
|
|
|
|
- Fix ob-latex.el command injection vulnerability (#2184377)
|
|
|
|
|
|
|
|
|
|
|
|
* Wed Mar 15 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1:27.2-8
|
|
|
|
* Wed Mar 15 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 27.2-6
|
|
|
|
- Rebuilt for MSVSphere 9.1.
|
|
|
|
- Rebuilt for MSVSphere 9.1.
|
|
|
|
|
|
|
|
|
|
|
|
* Tue Jan 10 2023 Jacek Migacz <jmigacz@redhat.com> - 1:27.2-8
|
|
|
|
* Tue Jan 10 2023 Jacek Migacz <jmigacz@redhat.com> - 1:27.2-8
|
|
|
|