xref: /OK3568_Linux_fs/buildroot/package/patch/patch.mk (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun################################################################################
2*4882a593Smuzhiyun#
3*4882a593Smuzhiyun# patch
4*4882a593Smuzhiyun#
5*4882a593Smuzhiyun################################################################################
6*4882a593Smuzhiyun
7*4882a593SmuzhiyunPATCH_VERSION = 2.7.6
8*4882a593SmuzhiyunPATCH_SOURCE = patch-$(PATCH_VERSION).tar.xz
9*4882a593SmuzhiyunPATCH_SITE = $(BR2_GNU_MIRROR)/patch
10*4882a593SmuzhiyunPATCH_LICENSE = GPL-3.0+
11*4882a593SmuzhiyunPATCH_LICENSE_FILES = COPYING
12*4882a593SmuzhiyunPATCH_CPE_ID_VENDOR = gnu
13*4882a593Smuzhiyun
14*4882a593Smuzhiyun# 0001-Fix-segfault-with-mangled-rename-patch.patch
15*4882a593SmuzhiyunPATCH_IGNORE_CVES += CVE-2018-6951
16*4882a593Smuzhiyun
17*4882a593Smuzhiyun# 0003-Fix-arbitrary-command-execution-in-ed-style-patches-.patch
18*4882a593SmuzhiyunPATCH_IGNORE_CVES += CVE-2018-1000156
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun# 0004-Invoke-ed-directly-instead-of-using-the-shell.patch
21*4882a593SmuzhiyunPATCH_IGNORE_CVES += CVE-2018-20969 CVE-2019-13638
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun# 0005-Don-t-follow-symlinks-unless--follow-symlinks-is-given.patch
24*4882a593SmuzhiyunPATCH_IGNORE_CVES += CVE-2019-13636
25*4882a593Smuzhiyun
26*4882a593Smuzhiyunifeq ($(BR2_PACKAGE_ATTR),y)
27*4882a593SmuzhiyunPATCH_CONF_OPTS += --enable-xattr
28*4882a593SmuzhiyunPATCH_DEPENDENCIES += attr
29*4882a593Smuzhiyunelse
30*4882a593SmuzhiyunPATCH_CONF_OPTS += --disable-xattr
31*4882a593Smuzhiyunendif
32*4882a593Smuzhiyun
33*4882a593Smuzhiyun$(eval $(autotools-package))
34