Files
poky/meta/recipes-devtools/git/git_2.3.0.bb
Armin Kuster f98b8b767d git: Security fixes CVE-2015-7545
CVE-2015-7545 git: arbitrary code execution via crafted URLs

(From OE-Core rev: 0c4bdd61acbc1fa1b9bfb167d8eaf90c8bccc25c)

Signed-off-by: Armin Kuster <akuster@mvista.com>

Already in Jethro, not needed in master due to shipping a version of git
which is already fixes (> 2.6.1)
Signed-off-by: Joshua Lock <joshua.g.lock@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-03-03 11:11:40 +00:00

19 lines
787 B
BlitzBasic

require git.inc
SRC_URI += "\
file://CVE-2015-7545_1.patch \
file://CVE-2015-7545_2.patch \
file://CVE-2015-7545_3.patch \
file://CVE-2015-7545_4.patch \
file://CVE-2015-7545_5.patch \
"
SRC_URI[tarball.md5sum] = "edf994cf34cd3354dadcdfa6b4292335"
SRC_URI[tarball.sha256sum] = "ba2fe814e709a5d0f034ebe82083fce7feed0899b3a8c8b3adf1c5a85d1ce9ac"
SRC_URI[manpages.md5sum] = "620797eb73b281d0706979ae8038bbd7"
SRC_URI[manpages.sha256sum] = "8aa4d1e5d7bbf5641a9de92279369d9b20cc266ba7b2888104efa40e80b53559"
EXTRA_OECONF += "ac_cv_snprintf_returns_bogus=no ac_cv_c_c99_format=yes \
ac_cv_fread_reads_directories=${ac_cv_fread_reads_directories=yes} \
"
EXTRA_OEMAKE += "NO_GETTEXT=1"