11 Commits

Author SHA1 Message Date
Adolf Belka
6948b9f7e9 sed: Update to version 4.9
- Update from version 4.8 to 4.9
- Update of rootfile not required
- Changelog
    * Noteworthy changes in release 4.9 (2022-11-06) [stable]
	** Bug fixes
		  'sed --follow-symlinks -i' no longer loops forever when its operand
		  is a symbolic link cycle.
		  [bug introduced in sed 4.2]
		  a program with an execution line longer than 2GB can no longer trigger
		  an out-of-bounds memory write.
		  using the R command to read an input line of length longer than 2GB
		  can no longer trigger an out-of-bounds memory read.
		  In locales using UTF-8 encoding, the regular expression '.' no
		  longer sometimes fails to match Unicode characters U+D400 through
		  U+D7FF (some Hangul Syllables, and Hangul Jamo Extended-B) and
		  Unicode characters U+108000 through U+10FFFF (half of Supplemental
		  Private Use Area plane B).
		  [bug introduced in sed 4.8]
		  I/O errors involving temp files no longer confuse sed into using a
		  FILE * pointer after fclosing it, which has undefined behavior in C.
	** New Features
		  The 'r' command now accepts address 0, allowing inserting a file before
		  the first line.
	** Changes in behavior
		   Sed now prints the less-surprising variant in a corner case of
		   POSIX-unspecified behavior.  Before, this would print "n".
		   Now, it prints "X":
		    printf n | sed 'sn\nnXn'; echo

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-11-21 11:05:13 +00:00
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Peter Müller
66c3619872 Early spring clean: Remove trailing whitespaces, and correct licence headers
Bumping across one of our scripts with very long trailing whitespaces, I
thought it might be a good idea to clean these up. Doing so, some
missing or inconsistent licence headers were fixed.

There is no need in shipping all these files en bloc, as their
functionality won't change.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-18 23:54:57 +00:00
Adolf Belka
8928b738d7 sed: Update to 4.8
- Update sed from 4.4 to 4.8
- Updated rootfile
- Changelog
	* Noteworthy changes in release 4.8 (2020-01-14) [stable]
		** Bug fixes
		- "sed -i" now creates temporary files with correct umask (limited to u=rwx).
		  Previously sed would incorrectly set umask on temporary files, resulting
		  in problems under certain fuse-like file systems.
		  [bug introduced in sed 4.2.1]
		** Release
		  distribute gzip-compressed tarballs once again
		** Improvements
		  a year's worth of gnulib development, including improved DFA performance
	* Noteworthy changes in release 4.7 (2018-12-20) [stable]
		** Bug fixes
		- Some uses of \b in the C locale and with the DFA matcher would fail, e.g.,
		  the following would mistakenly print "123-x" instead of "123":
		    echo 123-x|LC_ALL=C sed 's/.\bx//'
		- Using a multibyte locale or certain regexp constructs (some ranges,
		  backreferences) would avoid the bug.  [bug introduced in sed 4.6]
	* Noteworthy changes in release 4.6 (2018-12-19) [stable]
		** Improvements
		- sed now prints a clear error message when r/R/w/W (and s///w) commands
		  are missing a filename. Previously, w/W commands would fail with confusing
		  error message, while r/R would be a silent no-op.
		- sed now uses fully-buffered output (instead of line-buffered) when
		  writing to files. This should noticeably improve performance of "sed -i"
		  and other write commands.
		  Buffering can be disabled (as before) with "sed -u".
		- sed in non-cygwin windows environments (e.g. mingw) now properly handles
		  '\n' newlines in -b/--binary mode.
		** Bug fixes
		- sed no longer accesses invalid memory (heap overflow) when given invalid
		  backreferences in 's' command [bug#32082, present at least since sed-4.0.6].
		- sed no longer adds extraneous NUL when given s/$//n command.
		  [related to bug#32271, present since sed-4.0.7]
		- sed no longer accesses invalid memory (heap overflow) with s/$//n regexes.
		  [bug#32271, present since sed-4.3].
		** New Features
		  New option, --debug: print the input sed script in canonical form
		  and annotate program execution.
	* Noteworthy changes in release 4.5 (2018-03-31) [stable]
		** Bug fixes
		- sed now fails when matching very long input lines (>2GB).
		  Before, sed would silently ignore the regex without indicating an
		  error. [Bug present at least since sed-3.02]
		- sed no longer rejects comments and closing braces after y/// commands.
		  [Bug existed at least since sed-3.02]
		- sed -E --posix no longer ignores special meaning of '+','?','|' .
		  [Bug introduced in the original implementation of --posix option in
		  v4.1a-5-gba68fb4]
		- sed -i now creates selinux context based on the context of the symlink
		  instead of the symlink target. [Bug present since at least sed-4.2]
		- sed -i --follow-symlinks remains unchanged.
		- sed now treats the sequence '\x5c' (ASCII 92, backslash) as literal
		  backslash character, not as an escape prefix character.
		  [Bug present since sed-3.02.80]
		  Old behavior:
		     $ echo z | sed -E 's/(z)/\x5c1/' # identical to 's/(z)/\1/'
		     z
		  New behavior:
		     $ echo z | sed -E 's/(z)/\x5c1/'
		     \1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-03 22:29:56 +00:00
Matthias Fischer
d3ae3b9974 sed: Update to 4.4
Hi,

'sed' hasn't been updated in IPFire for a few years - I thought it could
be worthy an update:

Excerpt from 'NEWS':

"* Noteworthy changes in release 4.4 (2017-02-03) [stable]

  sed could segfault when invoked with specific combination of newlines
  in the input and regex pattern. [Bug introduced in sed-4.3]"

"Noteworthy changes" from release 4.2.2 to 4.3 can be found in 'NEWS' file, too much
to list them all...

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-01-24 16:06:07 +00:00
Michael Tremer
6c4cc7ea1b Move toolchain from /tools to /tools_${arch}
This will allow us to run multiple builds on the same
system at the same time (or at least have them on disk).

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-11-23 15:57:28 +00:00
Matthias Fischer
9dc6723a0a sed: Update to 4.2.2
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-02-08 01:33:53 +00:00
Michael Tremer
adbe990efa sed: Update to 4.2.1. 2012-08-12 16:39:18 -04:00
ms
70df830214 Ein Paar Dateien fuer die GPLv3 angepasst.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@853 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-08-29 13:25:32 +00:00
ms
dd714b8aad Habe IPFire auf LFS 6.2 gebracht.
Das hier ist der erste Teil.
Nur Toolchain bisher.


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@297 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-09-30 16:33:03 +00:00
ipfire
cd1a292722 git-svn-id: http://svn.ipfire.org/svn/ipfire/IPFire/source@16 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8 2006-02-15 21:15:54 +00:00