diff options
author | coadde [Márcio Alexandre Silva Delgado] <coadde@parabola.nu> | 2016-09-19 16:45:23 -0300 |
---|---|---|
committer | coadde [Márcio Alexandre Silva Delgado] <coadde@parabola.nu> | 2016-09-19 16:45:23 -0300 |
commit | 2834e16015e69fdb48537f610011892bc2f1c0f4 (patch) | |
tree | d93c03c409acde919b9cbfc9ee5aed9829ab0010 /libre | |
parent | efd311054b355913ebd1075f9f564a0e0e42f4a1 (diff) |
pcre-static: update package
Diffstat (limited to 'libre')
-rw-r--r-- | libre/pcre-static/01-CVE-2016-1283.patch | 18 | ||||
-rw-r--r-- | libre/pcre-static/PKGBUILD | 12 |
2 files changed, 5 insertions, 25 deletions
diff --git a/libre/pcre-static/01-CVE-2016-1283.patch b/libre/pcre-static/01-CVE-2016-1283.patch deleted file mode 100644 index 2c2dad29e..000000000 --- a/libre/pcre-static/01-CVE-2016-1283.patch +++ /dev/null @@ -1,18 +0,0 @@ -Index: pcre_compile.c -=================================================================== ---- a/pcre_compile.c (revision 1635) -+++ b/pcre_compile.c (revision 1636) -@@ -7311,7 +7311,12 @@ - so far in order to get the number. If the name is not found, leave - the value of recno as 0 for a forward reference. */ - -- else -+ /* This patch (removing "else") fixes a problem when a reference is -+ to multiple identically named nested groups from within the nest. -+ Once again, it is not the "proper" fix, and it results in an -+ over-allocation of memory. */ -+ -+ /* else */ - { - ng = cd->named_groups; - for (i = 0; i < cd->names_found; i++, ng++) diff --git a/libre/pcre-static/PKGBUILD b/libre/pcre-static/PKGBUILD index ee8939f10..3683bb799 100644 --- a/libre/pcre-static/PKGBUILD +++ b/libre/pcre-static/PKGBUILD @@ -3,8 +3,8 @@ _pkgname=pcre pkgname=pcre-static -pkgver=8.38 -pkgrel=3.1 +pkgver=8.39 +pkgrel=1 pkgdesc='A library that implements Perl 5-style regular expressions (static libraries only)' arch=('i686' 'x86_64' 'armv7h') url='http://www.pcre.org/' @@ -12,11 +12,9 @@ license=('BSD') depends=('pcre') options=('staticlibs') validpgpkeys=('45F68D54BBE23FB3039B46E59766E084FB0F43D8') # Philip Hazel -source=("ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/$_pkgname-$pkgver.tar.bz2"{,.sig} - '01-CVE-2016-1283.patch') -md5sums=('00aabbfe56d5a48b270f999b508c5ad2' - 'SKIP' - '722aba6455a3f0240eaa22289f0176a0') +source=("ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/$_pkgname-$pkgver.tar.bz2"{,.sig}) +md5sums=('e3fca7650a0556a2647821679d81f585' + 'SKIP') prepare() { cd $_pkgname-$pkgver |