Commit 69d767ad authored by Milan P. Stanić's avatar Milan P. Stanić

community/mutt: security upgrade to 2.0.5

remove CVE-2021-3181.patch, applied upstream
parent efc66073
Pipeline #68995 passed with stages
in 3 minutes and 17 seconds
......@@ -2,8 +2,8 @@
# Contributor: Andrew Manison <amanison@anselsystems.com>
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=mutt
pkgver=2.0.4
pkgrel=1
pkgver=2.0.5
pkgrel=0
pkgdesc="Small and very powerful text-mode email client"
url="http://www.mutt.org"
arch="all"
......@@ -13,7 +13,6 @@ makedepends="cyrus-sasl-dev gdbm-dev gettext-dev gpgme-dev
options="suid !check"
subpackages="$pkgname-doc $pkgname-lang"
source="https://bitbucket.org/mutt/mutt/downloads/mutt-$pkgver.tar.gz
CVE-2021-3181.patch::https://gitlab.com/muttmua/mutt/-/commit/c059e20ea4c7cb3ee9ffd3500ffe313ae84b2545.patch
"
# secfixes:
......@@ -63,5 +62,4 @@ package() {
"$pkgdir"/etc/Muttrc.gpg.dist
}
sha512sums="8080107810d2ff572b1532bb441573e4dcfbfbc03f28be711dcdebd1e6a1c8b5adf5c5a4f386ce0a661ff7050722b41e122c58964feae665ff4138013af18762 mutt-2.0.4.tar.gz
adfba1eaff2c5e7b046bf1ae42a472a13ca5b2efca525bca5aede84715899e8b1fb7c8d97b9c88f3688c36413c8789895e714d16616b8182e4543148bf743c21 CVE-2021-3181.patch"
sha512sums="41849d700b88e1b28b51fb90be2a9f6b639e8b111dce914073b66327e4655b5d4ca04dc3aedf2d44a0aa1a80ac3c4fcca6058eae7fb4f71f6b506fbe00a2a740 mutt-2.0.5.tar.gz"
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment