mirror of
				git://git.openwrt.org/openwrt/openwrt.git
				synced 2025-10-25 02:54:28 -04:00 
			
		
		
		
	GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. https://nvd.nist.gov/vuln/detail/CVE-2019-13638 Signed-off-by: Russell Senior <russell@personaltelco.net>
		
			
				
	
	
		
			26 lines
		
	
	
		
			558 B
		
	
	
	
		
			Makefile
		
	
	
	
	
	
			
		
		
	
	
			26 lines
		
	
	
		
			558 B
		
	
	
	
		
			Makefile
		
	
	
	
	
	
| # 
 | |
| # Copyright (C) 2013 OpenWrt.org
 | |
| #
 | |
| # This is free software, licensed under the GNU General Public License v2.
 | |
| # See /LICENSE for more information.
 | |
| #
 | |
| include $(TOPDIR)/rules.mk
 | |
| 
 | |
| PKG_NAME:=patch
 | |
| PKG_VERSION:=2.7.6
 | |
| PKG_RELEASE:=6
 | |
| PKG_CPE_ID:=cpe:/a:gnu:patch
 | |
| 
 | |
| PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.xz
 | |
| PKG_SOURCE_URL:=@GNU/patch
 | |
| PKG_HASH:=ac610bda97abe0d9f6b7c963255a11dcb196c25e337c61f94e4778d632f1d8fd
 | |
| 
 | |
| HOST_BUILD_PARALLEL := 1
 | |
| 
 | |
| include $(INCLUDE_DIR)/host-build.mk
 | |
| 
 | |
| HOSTCC := $(HOSTCC_NOCACHE)
 | |
| HOSTCXX := $(HOSTCXX_NOCACHE)
 | |
| 
 | |
| $(eval $(call HostBuild))
 |