blob: 69b3c3d8804bcb0f39079d6e10fe428527b54615 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
require dpkg.inc
LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe"
SRC_URI = "git://salsa.debian.org/dpkg-team/dpkg.git;protocol=https;branch=1.22.x;tag=${PV} \
file://noman.patch \
file://remove-tar-no-timestamp.patch \
file://arch_pm.patch \
file://add_armeb_triplet_entry.patch \
file://run-ptest \
file://0002-Adapt-to-linux-wrs-kernel-version-which-has-characte.patch \
file://0001-script.c-avoid-use-of-chroot.patch \
file://0004-The-lutimes-function-doesn-t-work-properly-for-all-s.patch \
file://0006-add-musleabi-to-known-target-tripets.patch \
file://0007-dpkg-deb-build.c-Remove-usage-of-clamp-mtime-in-tar.patch \
file://0001-dpkg-Support-muslx32-build.patch \
file://0001-Add-support-for-riscv32-CPU.patch \
"
SRC_URI:append:class-native = " file://0001-build.c-ignore-return-of-1-from-tar-cf.patch"
SRCREV = "d72b038fd2113cb62972e4071db03dd1388394d8"
# NVD tracks this CVE as "Up to (excluding) 2025-06-30" (which is fix commit date, not dpkg version)
CVE_STATUS[CVE-2025-6297] = "cpe-incorrect: this is fixed in 1.22.21"
|