openwrt-packages/devel
Russell Senior b82198ff47 patch: apply upstream patch for CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that
can be exploited by opening a crafted patch file that contains an ed style
diff payload with shell metacharacters. The ed editor does not need to be
present on the vulnerable system. This is different from CVE-2018-1000156.

https://nvd.nist.gov/vuln/detail/CVE-2019-13638

Signed-off-by: Russell Senior <russell@personaltelco.net>
2019-08-11 13:01:04 -07:00
..
asu asu: improve packaging 2019-03-08 04:26:31 +01:00
autoconf treewide: run "make check FIXUP=1" 2017-08-29 21:41:14 -07:00
automake automake: update to 1.15.1 2018-11-07 23:59:42 +01:00
diffutils diffutils: provide diff, cmp as alternatives 2019-06-15 13:28:43 +08:00
gcc gcc: fix build on x86 targets 2019-08-04 14:51:54 -07:00
libtool-bin treewide: run "make check FIXUP=1" 2017-08-29 21:41:14 -07:00
lpc21isp lpc21isp: remove build timestamp 2017-12-03 06:21:45 +01:00
lttng-modules lttng-modules: Update to 2.10.8 2018-12-08 19:54:48 -08:00
lttng-tools lttng-tools: Update to 2.10.6 2019-04-07 17:13:33 -07:00
m4 treewide: run "make check FIXUP=1" 2017-08-29 21:41:14 -07:00
make make: Do not use libelf 2019-06-02 14:06:24 -07:00
patch patch: apply upstream patch for CVE-2019-13638 2019-08-11 13:01:04 -07:00
pkg-config pkg-config: Update to 0.29.2 2018-06-10 17:36:32 -07:00