diff options
author | Henrik Riomar <henrik.riomar@gmail.com> | 2019-03-21 23:13:18 +0100 |
---|---|---|
committer | Carlo Landmeter <clandmeter@alpinelinux.org> | 2019-04-21 10:00:25 +0000 |
commit | bdaa9eb015d20e4539353d48dc00a624bfb2797c (patch) | |
tree | 82e96904ced37c4c6fb29d0dc80932dd64b803c6 /main/rpcbind/APKBUILD | |
parent | 1996bb4083c7a6d0aa36fbc1743fe08d92fa4286 (diff) |
main/rpcbind: upgrade to 1.2.5
Diffstat (limited to 'main/rpcbind/APKBUILD')
-rw-r--r-- | main/rpcbind/APKBUILD | 17 |
1 files changed, 7 insertions, 10 deletions
diff --git a/main/rpcbind/APKBUILD b/main/rpcbind/APKBUILD index a0edc87327c..497e421e400 100644 --- a/main/rpcbind/APKBUILD +++ b/main/rpcbind/APKBUILD @@ -1,7 +1,7 @@ # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=rpcbind -pkgver=0.2.4 -pkgrel=1 +pkgver=1.2.5 +pkgrel=0 pkgdesc="portmap replacement which supports RPC over various protocols" url="http://rpcbind.sourceforge.net" arch="all" @@ -10,11 +10,9 @@ license="BSD-3-Clause" depends= install="$pkgname.pre-install $pkgname.pre-upgrade" makedepends="libtirpc-dev autoconf automake bsd-compat-headers" -subpackages="$pkgname-dbg $pkgname-doc" +subpackages="$pkgname-dbg $pkgname-doc $pkgname-openrc" source="https://downloads.sourceforge.net/project/rpcbind/rpcbind/$pkgver/rpcbind-$pkgver.tar.bz2 - CVE-2017-8779.patch - pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch - rpcbproc_callit_com-Stop-freeing-a-static-pointer.patch + 0001-rpcinfo-Fix-stack-buffer-overflow.patch rpcbind.initd rpcbind.confd " @@ -39,6 +37,7 @@ build() { --host=$CHOST \ --prefix=/usr \ --bindir=/sbin \ + --sbindir=/sbin \ --enable-warmstarts \ --with-statedir=/var/lib/rpcbind \ --with-rpcuser=rpc \ @@ -54,9 +53,7 @@ package() { install -Dm644 "$srcdir"/rpcbind.confd "$pkgdir"/etc/conf.d/rpcbind install -D -m644 COPYING "$pkgdir"/usr/share/licenses/rpcbind/COPYING } -sha512sums="f3966a7284e94bdf120a9b3f0dd66efa1fe8761df2313545a031f77b7c06e27d7955d2780469943deb537d34f95c4cf3f30de523ec9fab9f571322d7224b210c rpcbind-0.2.4.tar.bz2 -cc3b7d72299279f6c7e7ce0329d29a8bc0c44a9e99c241cbbe8f34eba71ca16da7e87683a66e36565422dde9a3b03be8d6e345264495c6e2070f97116da32244 CVE-2017-8779.patch -1ecce48807b276381ff3199916e0b85880b948086e7891aa35df8a10f9188641253572c330e5fee35afa69c5ce3965ebead14fbe8ef20c49a4e9047345e63c5e pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch -a0125bd24a533366d7fcaed68e6671df65e3e39a4b18be2265f987602944d358666edef954f8707d24453331f7e96341739e5346bc1b233380c618b34a4014e2 rpcbproc_callit_com-Stop-freeing-a-static-pointer.patch +sha512sums="e884c4757950ccead0f9a07f50625a63e6f18f9bfae9fcfffa3e5fa4b7a66c3a99d9fa303061848fe8211509d5456f24ff26e4579af6e161a35522268f3ef3e4 rpcbind-1.2.5.tar.bz2 +84289e99b918fd138e6327a39481e74c80581746087d2e7e55d0c0bdbe068875b6136a6296c0d24a1be01d54b38a9d446794a3d08b53e7d884804a2b375519a2 0001-rpcinfo-Fix-stack-buffer-overflow.patch 1cd655d86226a45fa3e927f8ac2bb580537644d2fb3684e0f4a956bf3721c95d95b8b8c1d9a2a742fb714eeba9277e0400a7493bf1bf676466d70adb2b35a88e rpcbind.initd 0641087162ebc8fb10c5cb329105261d77cad073daed3f9a6c92574177298cd8a19a87b62dde14161cc554b5e68680cfd870b5334f3cfd8d6074ec8a43f4dfe3 rpcbind.confd" |