Renamed loadbuf-fix patch to CVE-2017-16844, because it got CVE number
This commit is contained in:
parent
43b93032c2
commit
63f04fe52f
@ -8,7 +8,7 @@
|
||||
Summary: Mail processing program
|
||||
Name: procmail
|
||||
Version: 3.22
|
||||
Release: 44%{?dist}
|
||||
Release: 45%{?dist}
|
||||
License: GPLv2+ or Artistic
|
||||
Group: Applications/Internet
|
||||
# Source: ftp://ftp.procmail.org/pub/procmail/procmail-%{version}.tar.gz
|
||||
@ -26,7 +26,7 @@ Patch5: procmail-3.22-ipv6.patch
|
||||
Patch6: procmail-3.22-getline.patch
|
||||
Patch7: procmail-3.22-CVE-2014-3618.patch
|
||||
Patch8: procmail-3.22-crash-fix.patch
|
||||
Patch9: procmail-3.22-loadbuf-fix.patch
|
||||
Patch9: procmail-3.22-CVE-2017-16844.patch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
|
||||
|
||||
%description
|
||||
@ -47,7 +47,7 @@ forward certain incoming mail automatically to someone.
|
||||
%patch6 -p1 -b .getline
|
||||
%patch7 -p1 -b .CVE-2014-3618
|
||||
%patch8 -p1 -b .crash-fix
|
||||
%patch9 -p1 -b .loadbuf-fix
|
||||
%patch9 -p1 -b .CVE-2017-16844
|
||||
|
||||
find examples -type f | xargs chmod 644
|
||||
|
||||
@ -83,6 +83,9 @@ rm -rf ${RPM_BUILD_ROOT}
|
||||
%{_mandir}/man[15]/*
|
||||
|
||||
%changelog
|
||||
* Tue Nov 21 2017 Jaroslav Škarvada <jskarvad@redhat.com> - 3.22-45
|
||||
- Renamed loadbuf-fix patch to CVE-2017-16844, because it got CVE number
|
||||
|
||||
* Tue Oct 10 2017 Jaroslav Škarvada <jskarvad@redhat.com> - 3.22-44
|
||||
- Fixed possible buffer overflow in loadbuf function
|
||||
Resolves: rhbz#1500071
|
||||
|
Loading…
Reference in New Issue
Block a user