mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-01-18 02:44:30 +00:00
571c71e6f7
We are migrating packages that meet below requirements: 1. using `callPackage` 2. called path is a directory 3. overriding set is empty (`{ }`) 4. not containing path expressions other than relative path (to makenixpkgs-vet happy) 5. not referenced by nix files outside of the directory, other than`pkgs/top-level/all-packages.nix` 6. not referencing nix files outside of the directory 7. not referencing `default.nix` (since it's changed to `package.nix`) 8. `outPath` doesn't change after migration The tool is here: https://github.com/Aleksanaa/by-name-migrate.
41 lines
1.4 KiB
Nix
41 lines
1.4 KiB
Nix
{ lib, stdenv, fetchurl, fetchpatch }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
pname = "openslp";
|
|
version = "2.0.0";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://sourceforge/openslp/${version}/${version}/openslp-${version}.tar.gz";
|
|
sha256 = "16splwmqp0400w56297fkipaq9vlbhv7hapap8z09gp5m2i3fhwj";
|
|
};
|
|
|
|
patches = [
|
|
(fetchpatch {
|
|
name = "openslp-2.0.0-null-pointer-deref.patch";
|
|
url = "https://src.fedoraproject.org/rpms/openslp/raw/696fd55ae4fcea7beda0a25131dca8bfb14bbdf9/f/openslp-2.0.0-null-pointer-deref.patch";
|
|
sha256 = "186f3rj3z2lf5h1lpbhqk0szj2a9far1p3mjqg6422f29yjfnz6a";
|
|
})
|
|
(fetchpatch {
|
|
name = "openslp-2.0.0-CVE-2016-7567.patch";
|
|
url = "https://src.fedoraproject.org/rpms/openslp/raw/696fd55ae4fcea7beda0a25131dca8bfb14bbdf9/f/openslp-2.0.0-cve-2016-7567.patch";
|
|
sha256 = "0zp61axx93b7nrbsyhn2x4dnw7n9y6g4rys21hyqxk4khrnc2yr9";
|
|
})
|
|
./CVE-2016-4912.patch
|
|
./CVE-2019-5544.patch
|
|
];
|
|
|
|
meta = with lib; {
|
|
homepage = "http://www.openslp.org/";
|
|
description = "Open-source implementation of the IETF Service Location Protocol";
|
|
maintainers = with maintainers; [ ttuegel ];
|
|
license = licenses.bsd3;
|
|
platforms = platforms.all;
|
|
# never built on aarch64-darwin since first introduction in nixpkgs
|
|
broken = stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64;
|
|
knownVulnerabilities = [
|
|
"CVE-2023-29552: UDP Reflection Attack with ampliciation factor of up to 2200"
|
|
];
|
|
};
|
|
|
|
}
|