From a3dde9d13dab999352d5eb4781fc4e768492f997 Mon Sep 17 00:00:00 2001 From: Piotr Bogdan Date: Tue, 10 Oct 2017 18:34:30 +0100 Subject: [PATCH] freeimage: fix CVE-2015-0852 & CVE-2016-5684 --- pkgs/development/libraries/freeimage/default.nix | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/pkgs/development/libraries/freeimage/default.nix b/pkgs/development/libraries/freeimage/default.nix index 6ee7670fc29..a2f47da7aaf 100644 --- a/pkgs/development/libraries/freeimage/default.nix +++ b/pkgs/development/libraries/freeimage/default.nix @@ -1,4 +1,4 @@ -{ stdenv, fetchurl, unzip, darwin }: +{ stdenv, fetchpatch, fetchurl, unzip, darwin }: stdenv.mkDerivation { name = "freeimage-3.17.0"; @@ -8,6 +8,17 @@ stdenv.mkDerivation { sha256 = "12bz57asdcfsz3zr9i9nska0fb6h3z2aizy412qjqkixkginbz7v"; }; + patches = [ + (fetchpatch { + url = "https://anonscm.debian.org/cgit/debian-science/packages/freeimage.git/plain/debian/patches/Fix-CVE-2015-0852.patch"; + sha256 = "0qkb96mvvhji75gz7dma3vj2b71smp96z3kl2ydj6skvnw6slnmc"; + }) + (fetchpatch { + url = "https://anonscm.debian.org/cgit/debian-science/packages/freeimage.git/plain/debian/patches/Fix-CVE-2016-5684.patch"; + sha256 = "18g5ckrvqfjcldis7zf7hmfl8b3mgnc6akd6x3cdq8c5j7l1y98f"; + }) + ]; + buildInputs = [ unzip ] ++ stdenv.lib.optional stdenv.isDarwin darwin.cctools; prePatch = if stdenv.isDarwin