diff --git a/community/exiv2/APKBUILD b/community/exiv2/APKBUILD index cb1161744d41dc26376928ba0c3ba6c50e0495a1..481ab78174f71ac5367430e726b5b5cf40fa7490 100644 --- a/community/exiv2/APKBUILD +++ b/community/exiv2/APKBUILD @@ -1,6 +1,6 @@ # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=exiv2 -pkgver=0.27.4 +pkgver=0.27.5 pkgrel=0 pkgdesc="Exif and Iptc metadata manipulation library and tools." url="https://exiv2.org/" @@ -13,19 +13,19 @@ subpackages="$pkgname-dev $pkgname-doc" source="https://exiv2.org/builds/exiv2-$pkgver-Source.tar.gz" builddir="$srcdir"/$pkgname-$pkgver-Source -prepare() { - default_prepare - - # -fcf-protection=full is only usable on x86_64 and x86 since those - # are the arches where Intel's CET Control-Flow Enforcement Technology - # is available - case "$CARCH" in - x86_64|x86) ;; - *) sed -i 's| -fcf-protection||g' cmake/compilerFlags.cmake ;; - esac -} - # secfixes: +# 0.27.5-r0: +# - CVE-2021-32815 +# - CVE-2021-34334 +# - CVE-2021-34335 +# - CVE-2021-37615 +# - CVE-2021-37616 +# - CVE-2021-37618 +# - CVE-2021-37619 +# - CVE-2021-37620 +# - CVE-2021-37621 +# - CVE-2021-37622 +# - CVE-2021-37623 # 0.27.4-r0: # - CVE-2021-29464 # 0.27.3-r2: @@ -52,6 +52,18 @@ prepare() { # - CVE-2019-13113 # - CVE-2019-13114 +prepare() { + default_prepare + + # -fcf-protection=full is only usable on x86_64 and x86 since those + # are the arches where Intel's CET Control-Flow Enforcement Technology + # is available + case "$CARCH" in + x86_64|x86) ;; + *) sed -i 's| -fcf-protection||g' cmake/compilerFlags.cmake ;; + esac +} + build() { cmake -B build . \ -DCMAKE_BUILD_TYPE=None \ @@ -70,5 +82,5 @@ package() { } sha512sums=" -f6798baafb36a54ba5bc65c2d28d4f4469e298582c90b417eb437b5dbda8e11963fb3314e8419717b3815ee8c3a68955cddc79e45351d9f2c165a0b73eb7b7be exiv2-0.27.4-Source.tar.gz +0f2d2dfbc976052a428dfeb597225d3ea3c725f584d05b99316bd4aa9cbf0ba5e1e37bcde71f9041975cf003b4fdb578c559adb144268d784bfd64494f451491 exiv2-0.27.5-Source.tar.gz "