diff options
author | Daniel Sabogal <dsabogalcc@gmail.com> | 2017-02-10 13:43:31 -0500 |
---|---|---|
committer | Leonardo Arena <rnalrd@alpinelinux.org> | 2017-02-13 07:45:10 +0000 |
commit | 8cf64f990d9d652084e6e8bccedc03f8a0a1eef7 (patch) | |
tree | 465f309c8d36b4ea37d558b9c5dc0a3069ce4762 /main/mupdf/APKBUILD | |
parent | bd8c2fb1f0a993c10476ec44433c0d713d42b87c (diff) | |
download | aports-8cf64f990d9d652084e6e8bccedc03f8a0a1eef7.tar.bz2 aports-8cf64f990d9d652084e6e8bccedc03f8a0a1eef7.tar.xz |
main/mupdf: security fix for CVE-2017-5896
Diffstat (limited to 'main/mupdf/APKBUILD')
-rw-r--r-- | main/mupdf/APKBUILD | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/main/mupdf/APKBUILD b/main/mupdf/APKBUILD index bc9ed9cdd5..a242705c4c 100644 --- a/main/mupdf/APKBUILD +++ b/main/mupdf/APKBUILD @@ -3,7 +3,7 @@ # Maintainer: Daniel Sabogal <dsabogalcc@gmail.com> pkgname=mupdf pkgver=1.10a -pkgrel=0 +pkgrel=1 pkgdesc="A lightweight PDF and XPS viewer" url="http://mupdf.com" arch="all" @@ -16,8 +16,13 @@ subpackages="$pkgname-doc $pkgname-dev $pkgname-x11:_x11 source="http://mupdf.com/downloads/archive/$pkgname-$pkgver-source.tar.gz shared-lib.patch openjpeg-2.1.patch + CVE-2017-5896.patch " +# secfixes: +# 1.10a-r1: +# - CVE-2017-5896 + builddir="$srcdir/$pkgname-$pkgver-source" prepare() { default_prepare || return 1 @@ -74,12 +79,7 @@ _tools() { "$subpkgdir"/usr/bin/ || return 1 } -md5sums="f80fbba2524d1d52f6ed09237d382411 mupdf-1.10a-source.tar.gz -8c4c5ec03c3df7e87a672c79302f6df5 shared-lib.patch -a5b85a55be0e958c16f900730ff24ad8 openjpeg-2.1.patch" -sha256sums="aacc1f36b9180f562022ef1ab3439b009369d944364f3cff8a2a898834e3a836 mupdf-1.10a-source.tar.gz -3ff3c9413c4c1005db7e41a085ce8e72ee1e956e8d1538a615f51f86f8bb1d14 shared-lib.patch -12ea2a295b62ca85298273d54b423ec8e73fb52d712bcee20bab0507a595b7a0 openjpeg-2.1.patch" sha512sums="8c735963364985e74ceb38242afae555a3d2ee7c69abe3fe5c485e8613a83d996a58f231cb689a156019d431fa67d565503247d010b0a404054850483aed9fec mupdf-1.10a-source.tar.gz bc38cc6935ed1c5941773e0671bea25d33897c1018c30f11ff3a1ec1e583276597f521b9e526f9bd38a6f9a1e76aa3e52782995ded72a618d07811abcd7ca734 shared-lib.patch -bfb509c529e26c3d2dc827298ce3a6083640fbe3fd7491560ffb1e8f86d62bbd4a5d52721079caef8a38d6f332132b581859276000b397f9512673eedb0315a7 openjpeg-2.1.patch" +bfb509c529e26c3d2dc827298ce3a6083640fbe3fd7491560ffb1e8f86d62bbd4a5d52721079caef8a38d6f332132b581859276000b397f9512673eedb0315a7 openjpeg-2.1.patch +e9f29b909e016967fc9e6ca6723d63aecfea5c8aeadbd923bbf8a0fa1f4b0e16bd4eedac178bbf5fa359e47a55aa307b6581c6ce45b177ee12430f41c0b49cd7 CVE-2017-5896.patch" |