Upgrade to zlib-1.2.3

git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@6576 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
This commit is contained in:
Matthew Burgess 2005-07-23 11:58:40 +00:00
parent f6eeb399c6
commit 23bafc9180
5 changed files with 6 additions and 14 deletions

View File

@ -81,7 +81,7 @@ First a summary, then a detailed log.</para>
<listitem><para>Udev &udev-version;</para></listitem>
<!-- <listitem><para>Util-Linux &util-linux-version;</para></listitem> -->
<!-- <listitem><para>Vim &vim-version;</para></listitem> -->
<!-- <listitem><para>Zlib &zlib-version;</para></listitem> -->
<listitem><para>Zlib &zlib-version;</para></listitem>
</itemizedlist>
</listitem>
@ -104,9 +104,12 @@ First a summary, then a detailed log.</para>
<listitem><para>inetutils-1.4.2-kernel_headers-1.patch</para></listitem>
<listitem><para>iproute2-2.6.11-050330-remove_db-1.patch</para></listitem>
<listitem><para>perl-5.8.6-libc-1.patch</para></listitem>
<listitem><para>zlib-1.2.2-security_fix-1.patch</para></listitem>
</itemizedlist>
</listitem>
<listitem><para>July 22nd, 2005 [matt]: Updated to zlib-1.2.3.</para></listitem>
<listitem><para>July 22th, 2005 [manuel]: Added obfuscate.sh and modified the
Makefile to obfuscate e-mail addresses in XHTML output.</para></listitem>

View File

@ -422,7 +422,7 @@ url="ftp://ftp.linuxfromscratch.org/pub/lfs/"/>.</para></note>
</varlistentry>
<varlistentry>
<term>Zlib (&zlib-version;) - 368 KB:</term>
<term>Zlib (&zlib-version;) - 415 KB:</term>
<listitem>
<para><ulink url="http://www.zlib.net/"/></para>
</listitem>

View File

@ -147,12 +147,6 @@ needed to build an LFS system:</para>
</listitem>
</varlistentry>
<varlistentry>
<term>Zlib Security Patch - 1 KB:</term><listitem>
<para><ulink url="&patches-root;&zlib-security_fix-patch;"/></para>
</listitem>
</varlistentry>
</variablelist>
<para>In addition to the above required patches, there exist a number of

View File

@ -30,11 +30,6 @@ some programs.</para>
<sect2 role="installation">
<title>Installation of Zlib</title>
<para>Zlib has a buffer overflow vulnerability that can lead to a Denial of
Service attack. The following patch fixes the problem:</para>
<screen><userinput>patch -Np1 -i ../&zlib-security_fix-patch;</userinput></screen>
<note><para>Zlib is known to build its shared library incorrectly if
<envar>CFLAGS</envar> is specified in the environment. If using a
specified <envar>CFLAGS</envar>

View File

@ -78,4 +78,4 @@
<!ENTITY udev-version "063">
<!ENTITY util-linux-version "2.12q">
<!ENTITY vim-version "6.3">
<!ENTITY zlib-version "1.2.2">
<!ENTITY zlib-version "1.2.3">