Russell Senior 89b362e22b patch: apply upstream patch for CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that
can be exploited by opening a crafted patch file that contains an ed style
diff payload with shell metacharacters. The ed editor does not need to be
present on the vulnerable system. This is different from CVE-2018-1000156.

https://nvd.nist.gov/vuln/detail/CVE-2019-13638

Signed-off-by: Russell Senior <russell@personaltelco.net>
(cherry-picked from b82198ff47)
2019-09-26 19:36:21 -07:00
2018-01-27 11:24:43 +08:00
2019-09-02 01:49:53 +00:00
2019-09-17 08:44:59 +02:00
2019-09-23 12:00:10 -07:00
2019-09-24 15:08:52 -07:00
2019-09-26 19:47:29 +02:00
2019-09-23 11:58:16 -07:00
2019-09-23 11:58:27 -07:00
2018-07-17 20:35:00 +08:00
2014-06-16 08:14:04 +02:00

OpenWrt packages feed

Description

This is the OpenWrt "packages"-feed containing community-maintained build scripts, options and patches for applications, modules and libraries used within OpenWrt.

Installation of pre-built packages is handled directly by the opkg utility within your running OpenWrt system or by using the OpenWrt SDK on a build system.

Usage

This repository is intended to be layered on-top of an OpenWrt buildroot. If you do not have an OpenWrt buildroot installed, see the documentation at: OpenWrt Buildroot Installation on the OpenWrt support site.

This feed is enabled by default. To install all its package definitions, run:

./scripts/feeds update packages
./scripts/feeds install -a -p packages

License

See LICENSE file.

Package Guidelines

See CONTRIBUTING.md file.

S
Description
Community maintained packages for OpenWrt. Documentation for submitting pull requests is in CONTRIBUTING.md
Readme GPL-2.0 42 MiB
Languages
Makefile 58.3%
Shell 28.2%
C 6.8%
C++ 2.4%
Lua 1.2%
Other 2.9%