Package: libcap2 / 1:2.36-1

Metadata

Package Version Patches format
libcap2 1:2.36-1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
ldlibs.patch | (download)

pam_cap/Makefile | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 compile pam_cap with -lpam

A similar fix was in Debian but appears to have been accidentally
dropped. Drop this one if or when debian gets it back so we can
directly sync (Closes: #591410).

setcap error message.patch | (download)

progs/setcap.c | 22 21 + 1 - 0 !
1 file changed, 21 insertions(+), 1 deletion(-)

 refine setcap output on errors (closes: #633075)

The error message of setcap is a little confused. From the error message it is
hard to detect what is wrong. I removed the last 'usage' function call,
because at that code point the 'usage' can not provide any useful information.
Instead, I added a function 'mystrerror' which shall provide more information.

Don t hardcode build flags.patch | (download)

Make.Rules | 6 3 + 3 - 0 !
libcap/Makefile | 10 5 + 5 - 0 !
pam_cap/Makefile | 4 2 + 2 - 0 !
progs/Makefile | 4 2 + 2 - 0 !
4 files changed, 12 insertions(+), 12 deletions(-)

 don't hardcode build flags

Remove upstream's hardcoded build flags in Makefiles so that the build flags
passed on by dpkg-buildflags are honored. This enables hardening during build.

Hide private symbols.patch | (download)

libcap/Makefile | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 hide private symbols

Hide a symbol which is clearly meant to be private. This resolves a FTBFS in
combination with the new build dependency gperf.

Also update the signature of __cap_lookup_name for gperf 3.1.

Closes: #793311
Closes: #869588

Bug-Debian: https://bugs.debian.org/793311
Bug-Debian: https://bugs.debian.org/869588
Filter out PIE flags when building shared objects.patch | (download)

libcap/Makefile | 2 2 + 0 - 0 !
pam_cap/Makefile | 3 3 + 0 - 0 !
2 files changed, 5 insertions(+)

 filter out pie flags when building shared objects

Filter out -pie, -fpie, and -fPIE when building the shared library and the PAM
module. This way, hardening=+all can be used unconditionally in debian/rules.

Use DEB_GAIN_ROOT_CMD for make test.patch | (download)

pam_cap/Makefile | 14 7 + 7 - 0 !
progs/Makefile | 2 1 + 1 - 0 !
2 files changed, 8 insertions(+), 8 deletions(-)

 use $deb_gain_root_cmd for make test

The $DEB_GAIN_ROOT_CMD environment variable is the mechanism to run
build/test commands as root, according to section 4.9.2 of the Debian
Policy.  Use it instead of sudo (which is not guaranteed to be
available, since it is not a build-dependency).

Make.Rules Allow overriding DYNAMIC.patch | (download)

Make.Rules | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 make.rules: allow overriding dynamic

So that we can build dynamic binaries even when building from a git
repo (e.g. with git-buildpackage).