diff --git a/backport-Undelete-usleep-nanosleep-ttyname-poll.patch b/backport-Undelete-usleep-nanosleep-ttyname-poll.patch new file mode 100644 index 0000000000000000000000000000000000000000..070c24de9f8056edcdbb01945d917aa80ebbaa3d --- /dev/null +++ b/backport-Undelete-usleep-nanosleep-ttyname-poll.patch @@ -0,0 +1,25 @@ +From a1253db65213beb0edbf8fa4ab2de9cec729bd2b Mon Sep 17 00:00:00 2001 +From: rpm-build +Date: Tue, 2 Apr 2024 14:56:55 +0800 +Subject: [PATCH] Undelete usleep,nanosleep,ttyname,poll + +--- + configure.ac | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/configure.ac b/configure.ac +index f0b71e1..52c5f90 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -276,7 +276,7 @@ AC_TRY_COMPILE([], [int f(int a) { return a; }], + + # Checks for library functions. + AC_TYPE_SIGNAL +-AC_CHECK_FUNCS([popen _setjmp sigprocmask sigsetmask snprintf stat system fchmod realpath]) ++AC_CHECK_FUNCS([fchmod nanosleep poll popen realpath _setjmp sigprocmask sigsetmask snprintf stat system ttyname usleep]) + + # AC_CHECK_FUNCS may not work for inline functions, so test these separately. + AC_MSG_CHECKING(for memcpy) +-- +2.33.0 + diff --git a/less.spec b/less.spec index 34baca5438bcf5479531c186b13fd78774013200..12864dd1ebb671473759ae0780a61a88c65a7928 100644 --- a/less.spec +++ b/less.spec @@ -1,6 +1,6 @@ Name: less Version: 590 -Release: 3 +Release: 4 Summary: Less is a pager that displays text files. License: GPLv3+ or BSD URL: http://www.greenwoodsoftware.com/less @@ -9,6 +9,7 @@ Patch0: less-394-time.patch Patch1: less-475-fsync.patch Patch2: backport-End-OSC8-hyperlink-on-invalid-embedded-escape-sequen.patch Patch3: backport-Shell-quote-filenames-when-invoking-LESSCLOSE.patch +Patch4: backport-Undelete-usleep-nanosleep-ttyname-poll.patch BuildRequires: git gcc make ncurses-devel autoconf automake libtool @@ -47,6 +48,9 @@ autoreconf -ivf %{_mandir}/man1/* %changelog +* Tue Apr 02 2024 yinyongkang - 590-4 +- Undelete usleep,nanosleep,ttyname,poll + * Mon Feb 19 2024 liweigang - 590-3 - fix CVE-2022-48624