aboutsummaryrefslogtreecommitdiffstats
path: root/main/rpcbind/APKBUILD
diff options
context:
space:
mode:
authorHenrik Riomar <henrik.riomar@gmail.com>2019-03-21 23:13:18 +0100
committerCarlo Landmeter <clandmeter@alpinelinux.org>2019-04-21 10:00:25 +0000
commitbdaa9eb015d20e4539353d48dc00a624bfb2797c (patch)
tree82e96904ced37c4c6fb29d0dc80932dd64b803c6 /main/rpcbind/APKBUILD
parent1996bb4083c7a6d0aa36fbc1743fe08d92fa4286 (diff)
main/rpcbind: upgrade to 1.2.5
Diffstat (limited to 'main/rpcbind/APKBUILD')
-rw-r--r--main/rpcbind/APKBUILD17
1 files changed, 7 insertions, 10 deletions
diff --git a/main/rpcbind/APKBUILD b/main/rpcbind/APKBUILD
index a0edc87327c..497e421e400 100644
--- a/main/rpcbind/APKBUILD
+++ b/main/rpcbind/APKBUILD
@@ -1,7 +1,7 @@
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=rpcbind
-pkgver=0.2.4
-pkgrel=1
+pkgver=1.2.5
+pkgrel=0
pkgdesc="portmap replacement which supports RPC over various protocols"
url="http://rpcbind.sourceforge.net"
arch="all"
@@ -10,11 +10,9 @@ license="BSD-3-Clause"
depends=
install="$pkgname.pre-install $pkgname.pre-upgrade"
makedepends="libtirpc-dev autoconf automake bsd-compat-headers"
-subpackages="$pkgname-dbg $pkgname-doc"
+subpackages="$pkgname-dbg $pkgname-doc $pkgname-openrc"
source="https://downloads.sourceforge.net/project/rpcbind/rpcbind/$pkgver/rpcbind-$pkgver.tar.bz2
- CVE-2017-8779.patch
- pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
- rpcbproc_callit_com-Stop-freeing-a-static-pointer.patch
+ 0001-rpcinfo-Fix-stack-buffer-overflow.patch
rpcbind.initd
rpcbind.confd
"
@@ -39,6 +37,7 @@ build() {
--host=$CHOST \
--prefix=/usr \
--bindir=/sbin \
+ --sbindir=/sbin \
--enable-warmstarts \
--with-statedir=/var/lib/rpcbind \
--with-rpcuser=rpc \
@@ -54,9 +53,7 @@ package() {
install -Dm644 "$srcdir"/rpcbind.confd "$pkgdir"/etc/conf.d/rpcbind
install -D -m644 COPYING "$pkgdir"/usr/share/licenses/rpcbind/COPYING
}
-sha512sums="f3966a7284e94bdf120a9b3f0dd66efa1fe8761df2313545a031f77b7c06e27d7955d2780469943deb537d34f95c4cf3f30de523ec9fab9f571322d7224b210c rpcbind-0.2.4.tar.bz2
-cc3b7d72299279f6c7e7ce0329d29a8bc0c44a9e99c241cbbe8f34eba71ca16da7e87683a66e36565422dde9a3b03be8d6e345264495c6e2070f97116da32244 CVE-2017-8779.patch
-1ecce48807b276381ff3199916e0b85880b948086e7891aa35df8a10f9188641253572c330e5fee35afa69c5ce3965ebead14fbe8ef20c49a4e9047345e63c5e pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
-a0125bd24a533366d7fcaed68e6671df65e3e39a4b18be2265f987602944d358666edef954f8707d24453331f7e96341739e5346bc1b233380c618b34a4014e2 rpcbproc_callit_com-Stop-freeing-a-static-pointer.patch
+sha512sums="e884c4757950ccead0f9a07f50625a63e6f18f9bfae9fcfffa3e5fa4b7a66c3a99d9fa303061848fe8211509d5456f24ff26e4579af6e161a35522268f3ef3e4 rpcbind-1.2.5.tar.bz2
+84289e99b918fd138e6327a39481e74c80581746087d2e7e55d0c0bdbe068875b6136a6296c0d24a1be01d54b38a9d446794a3d08b53e7d884804a2b375519a2 0001-rpcinfo-Fix-stack-buffer-overflow.patch
1cd655d86226a45fa3e927f8ac2bb580537644d2fb3684e0f4a956bf3721c95d95b8b8c1d9a2a742fb714eeba9277e0400a7493bf1bf676466d70adb2b35a88e rpcbind.initd
0641087162ebc8fb10c5cb329105261d77cad073daed3f9a6c92574177298cd8a19a87b62dde14161cc554b5e68680cfd870b5334f3cfd8d6074ec8a43f4dfe3 rpcbind.confd"