From 142c3153f743f9cb6069d2231a95af2c65aec9f7 Mon Sep 17 00:00:00 2001 From: Andreas Rammhold Date: Fri, 6 Mar 2020 23:35:18 +0100 Subject: [PATCH] ppp: apply patch for CVE-2020-8597 This fixes a potential buffer overflow in the eap_{request,response} functions. --- pkgs/tools/networking/ppp/default.nix | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/pkgs/tools/networking/ppp/default.nix b/pkgs/tools/networking/ppp/default.nix index 564ba88a97d..1579823450b 100644 --- a/pkgs/tools/networking/ppp/default.nix +++ b/pkgs/tools/networking/ppp/default.nix @@ -31,6 +31,11 @@ stdenv.mkDerivation rec { url = https://www.nikhef.nl/~janjust/ppp/ppp-2.4.7-eaptls-mppe-1.102.patch; sha256 = "04war8l5szql53l36043hvzgfwqp3v76kj8brbz7wlf7vs2mlkia"; }) + (fetchpatch { + name = "CVE-2020-8597.patch"; + url = "https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426.patch"; + sha256 = "129wnhwxmzvr3y9gzxv82jnb5y8m4yg8vkpa0xl2rwkl8anbzgkh"; + }) ./musl-fix-headers.patch ];