Date: Monday, April 18, 2016 @ 16:28:11 Author: fyan Revision: 171356
upgpkg: python-pykerberos 1.1.10-2 add a patch from upstream Added: python-pykerberos/trunk/issue15.patch Modified: python-pykerberos/trunk/PKGBUILD ---------------+ PKGBUILD | 11 ++++++++--- issue15.patch | 22 ++++++++++++++++++++++ 2 files changed, 30 insertions(+), 3 deletions(-) Modified: PKGBUILD =================================================================== --- PKGBUILD 2016-04-18 14:05:39 UTC (rev 171355) +++ PKGBUILD 2016-04-18 14:28:11 UTC (rev 171356) @@ -4,16 +4,21 @@ pkgbase=python-pykerberos pkgname=('python-pykerberos' 'python2-pykerberos') pkgver=1.1.10 -pkgrel=1 +pkgrel=2 pkgdesc="High-level interface to Kerberos" arch=('i686' 'x86_64') license=('Apache') url="https://github.com/02strich/pykerberos" makedepends=('python-setuptools' 'python2-setuptools' 'krb5' 'git') -source=("git+https://github.com/02strich/pykerberos.git#tag=v$pkgver") -sha512sums=('SKIP') +source=("git+https://github.com/02strich/pykerberos.git#tag=v$pkgver" + issue15.patch) +sha512sums=('SKIP' + 'e0f413924a5f2acf6d48e3df860a301fa5d270edffd47e56c1d04ab972357a6d1934ceea3dc91b446ebb2eddcd39eb6ef312e39ec7b566027e180428191d8f9e') prepare() { + # https://github.com/02strich/pykerberos/issues/15 + (cd pykerberos; patch -p1 -i ../issue15.patch) + cp -a pykerberos{,-py2} } Added: issue15.patch =================================================================== --- issue15.patch (rev 0) +++ issue15.patch 2016-04-18 14:28:11 UTC (rev 171356) @@ -0,0 +1,22 @@ +From 6eabbd87690948f7aa489e28f2c216130218d465 Mon Sep 17 00:00:00 2001 +From: Bernie Hackett <ber...@10gen.com> +Date: Thu, 25 Feb 2016 15:22:51 -0800 +Subject: [PATCH] Don't free stack allocated buffer #15 + +--- + src/kerberosgss.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/kerberosgss.c b/src/kerberosgss.c +index 86788da..99436c8 100644 +--- a/src/kerberosgss.c ++++ b/src/kerberosgss.c +@@ -603,7 +603,7 @@ int authenticate_gss_client_wrap(gss_client_state* state, const char* challenge, + if (output_token.value) + gss_release_buffer(&min_stat, &output_token); + +- if (input_token.value) ++ if (!user && input_token.value) + gss_release_buffer(&min_stat, &input_token); + + return ret;