From 19ae9575a3b6ad8c7de8402b0926e36b51582544 Mon Sep 17 00:00:00 2001 From: Natanael Copa Date: Fri, 14 Jul 2017 18:44:45 +0000 Subject: main/rpcbind: upgrade to 0.2.4 --- main/rpcbind/APKBUILD | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) (limited to 'main/rpcbind/APKBUILD') diff --git a/main/rpcbind/APKBUILD b/main/rpcbind/APKBUILD index 6a415e242f..cb8998c18f 100644 --- a/main/rpcbind/APKBUILD +++ b/main/rpcbind/APKBUILD @@ -1,7 +1,7 @@ # Maintainer: Natanael Copa pkgname=rpcbind -pkgver=0.2.3 -pkgrel=3 +pkgver=0.2.4 +pkgrel=0 pkgdesc="portmap replacement which supports RPC over various protocols" url="http://rpcbind.sourceforge.net" arch="all" @@ -11,11 +11,17 @@ install="$pkgname.pre-install $pkgname.pre-upgrade" makedepends="libtirpc-dev autoconf automake bsd-compat-headers" subpackages="$pkgname-dbg $pkgname-doc" source="http://downloads.sourceforge.net/project/rpcbind/rpcbind/$pkgver/rpcbind-$pkgver.tar.bz2 - git.patch + CVE-2017-8779.patch + pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch + rpcbproc_callit_com-Stop-freeing-a-static-pointer.patch rpcbind.initd rpcbind.confd " +# secfixes: +# 0.2.4-r0: +# - CVE-2017-8779 + builddir="$srcdir"/rpcbind-$pkgver prepare() { cd "$builddir" @@ -52,15 +58,9 @@ package() { install -Dm644 "$srcdir"/rpcbind.confd "$pkgdir"/etc/conf.d/rpcbind install -D -m644 COPYING "$pkgdir"/usr/share/licenses/rpcbind/COPYING } -md5sums="c8875246b2688a1adfbd6ad43480278d rpcbind-0.2.3.tar.bz2 -04c7ba5d58d6a45671987416da4cbaa4 git.patch -4fbc48760c73976457349150779b3b8b rpcbind.initd -2517c71cdb08f133b0d50055a44c56de rpcbind.confd" -sha256sums="9897823a9d820ea011d9ea02054d5ab99469b9ca5346265fee380713c8fed27b rpcbind-0.2.3.tar.bz2 -4bb0809463d4e18c81c1a1802edda1cc314e1a6890ad3a229cb0ef4723d0bf26 git.patch -ed0906acfda9f038776530ef56fcbea8627837f707682ce7311e10c7259cfb15 rpcbind.initd -55bcd47a4d0f194f09e6abb13695853459f869b54ce09ef051e55efcd8ad3903 rpcbind.confd" -sha512sums="b91cb4e0849213d344063ccf32d16c49819906b65e4d07c4aa7d3c8842bd83acb408d07aa285da902c389f3c9716f01678012b93a11863eb174a2577cd6ba1d6 rpcbind-0.2.3.tar.bz2 -f797f5bd309a64955c0acdcab970ecef192f7849862e676ec361977abbb8f05ec36b839b94cf3abc71956e467ace2c2ebf5d190db2874f4249d5a7d0037a9751 git.patch +sha512sums="f3966a7284e94bdf120a9b3f0dd66efa1fe8761df2313545a031f77b7c06e27d7955d2780469943deb537d34f95c4cf3f30de523ec9fab9f571322d7224b210c rpcbind-0.2.4.tar.bz2 +cc3b7d72299279f6c7e7ce0329d29a8bc0c44a9e99c241cbbe8f34eba71ca16da7e87683a66e36565422dde9a3b03be8d6e345264495c6e2070f97116da32244 CVE-2017-8779.patch +1ecce48807b276381ff3199916e0b85880b948086e7891aa35df8a10f9188641253572c330e5fee35afa69c5ce3965ebead14fbe8ef20c49a4e9047345e63c5e pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch +a0125bd24a533366d7fcaed68e6671df65e3e39a4b18be2265f987602944d358666edef954f8707d24453331f7e96341739e5346bc1b233380c618b34a4014e2 rpcbproc_callit_com-Stop-freeing-a-static-pointer.patch 1cd655d86226a45fa3e927f8ac2bb580537644d2fb3684e0f4a956bf3721c95d95b8b8c1d9a2a742fb714eeba9277e0400a7493bf1bf676466d70adb2b35a88e rpcbind.initd 0641087162ebc8fb10c5cb329105261d77cad073daed3f9a6c92574177298cd8a19a87b62dde14161cc554b5e68680cfd870b5334f3cfd8d6074ec8a43f4dfe3 rpcbind.confd" -- cgit v1.2.3