diff options
Diffstat (limited to 'main/patch/APKBUILD')
-rw-r--r-- | main/patch/APKBUILD | 30 |
1 files changed, 21 insertions, 9 deletions
diff --git a/main/patch/APKBUILD b/main/patch/APKBUILD index ac8c05c93be..b7ed0f10ffd 100644 --- a/main/patch/APKBUILD +++ b/main/patch/APKBUILD @@ -2,31 +2,36 @@ # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=patch pkgver=2.7.6 -pkgrel=6 +pkgrel=10 pkgdesc="Utility to apply diffs to files" url="https://www.gnu.org/software/patch/patch.html" arch="all" license="GPL-3.0-or-later" -depends="" makedepends="autoconf automake" # testsuite needs coreutils due to bug in busybox `cat -ve` # http://lists.busybox.net/pipermail/busybox/2018-April/086401.html checkdepends="coreutils bash ed" subpackages="$pkgname-doc" -source="https://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.xz - CVE-2018-6951.patch - CVE-2018-6952.patch +source="https://ftp.gnu.org/gnu/patch/patch-$pkgver.tar.xz 0001-Allow-input-files-to-be-missing-for-ed-style-patches.patch 0002-Fix-arbitrary-command-execution-in-ed-style-patches-.patch + 0003-memory-allocation.patch + 0004-fix-memleak.patch + CVE-2018-6951.patch + CVE-2018-6952.patch CVE-2019-13636.patch CVE-2019-13638.patch + CVE-2019-20633.patch " builddir="$srcdir"/$pkgname-$pkgver # secfixes: +# 2.7.6-r7: +# - CVE-2019-20633 # 2.7.6-r6: # - CVE-2018-1000156 # - CVE-2019-13638 +# - CVE-2018-20969 # 2.7.6-r5: # - CVE-2019-13636 # 2.7.6-r2: @@ -36,6 +41,8 @@ builddir="$srcdir"/$pkgname-$pkgver prepare() { default_prepare + update_config_sub + aclocal && autoheader && autoconf && automake --add-missing } @@ -65,10 +72,15 @@ package() { rmdir -p "$pkgdir"/usr/lib 2>/dev/null || true } -sha512sums="fcca87bdb67a88685a8a25597f9e015f5e60197b9a269fa350ae35a7991ed8da553939b4bbc7f7d3cfd863c67142af403b04165633acbce4339056a905e87fbd patch-2.7.6.tar.xz -db51d0b791d38dd4f1b373621ee18620ae339b172f58a79420fdaa4a4b1b1d9df239cf61bbddc4e6a4896b28b8cffc7c99161eb5e2facaec8df86a1bf7755bc0 CVE-2018-6951.patch -5d2eaef629bae92e5b4e5e57d140c24a73e2811306d5f2854858f846646b034d2da315071f478bcf6f8d856a065b9bb073f76322e8e3a42616bc212281ce6945 CVE-2018-6952.patch +sha512sums=" +fcca87bdb67a88685a8a25597f9e015f5e60197b9a269fa350ae35a7991ed8da553939b4bbc7f7d3cfd863c67142af403b04165633acbce4339056a905e87fbd patch-2.7.6.tar.xz 33e8a82f5ee6b896fd434e7de1ca9e16e8d317941a021bea8c53afd5bf210774e8727df22f8d8f63f255de10de5a26428047bc710b033423d1e7a459cbbaf83a 0001-Allow-input-files-to-be-missing-for-ed-style-patches.patch d0d46e28c5fdcd5fe16826cbcf39d5a74fdf2593375d5206aa7bad759f16dbebeca3bf259239f99c13344579044a3de1000d705065cc19e917266bca6e5c0630 0002-Fix-arbitrary-command-execution-in-ed-style-patches-.patch +3dd30ef35da27f83678fe61ae132de0e9f7c3262831ada5decbe8ac970bf928d7fad9c99f58484f90898b15ce11f297cd078588c29f8528e582842a9bd66d74f 0003-memory-allocation.patch +94a8dc8eddd814f0837a8cb673f09d8a6cd12072b46466d94e01d8273ef7499a9d0568f5cae53ef80983b36cb00de272ae8054a7a5755c043bc01c1bafdc96a2 0004-fix-memleak.patch +db51d0b791d38dd4f1b373621ee18620ae339b172f58a79420fdaa4a4b1b1d9df239cf61bbddc4e6a4896b28b8cffc7c99161eb5e2facaec8df86a1bf7755bc0 CVE-2018-6951.patch +5d2eaef629bae92e5b4e5e57d140c24a73e2811306d5f2854858f846646b034d2da315071f478bcf6f8d856a065b9bb073f76322e8e3a42616bc212281ce6945 CVE-2018-6952.patch 029b92bb899d0b1165cfe7f55b5a4c2d7090852f52e5c85a6bb1cf5913c914a5c68c6c34517e84f0a020a56d21814f8c18b934c8ebe059ba4eddece78a3a258c CVE-2019-13636.patch -d60f8c2364fca9b73aa73b5914cfd6571d11528d13fa7703ccfa93730cbdf8a6e4c9ca04cb7d02a40d33c38075890790b490052d5217e728b0948991da937980 CVE-2019-13638.patch" +d60f8c2364fca9b73aa73b5914cfd6571d11528d13fa7703ccfa93730cbdf8a6e4c9ca04cb7d02a40d33c38075890790b490052d5217e728b0948991da937980 CVE-2019-13638.patch +e988836c90946282e70fca0fe29a52405a357b14bfdc8fce3afb680d7d1b25c4bf9d9cbc5612e3bb2d9379192635d7f1bf1b7b16c23b13d77450ec87dc5e3fe4 CVE-2019-20633.patch +" |