2014-12-10 18:20:28 +00:00
|
|
|
{ stdenv, fetchurl, fetchpatch }:
|
2005-08-30 14:56:15 +01:00
|
|
|
|
2015-09-18 05:04:49 +01:00
|
|
|
let
|
|
|
|
version = "2.12";
|
|
|
|
name = "cpio-${version}";
|
|
|
|
in stdenv.mkDerivation {
|
|
|
|
inherit name;
|
2013-03-20 22:01:36 +00:00
|
|
|
|
2005-08-30 14:56:15 +01:00
|
|
|
src = fetchurl {
|
2015-09-18 05:04:49 +01:00
|
|
|
url = "mirror://gnu/cpio/${name}.tar.bz2";
|
|
|
|
sha256 = "0vi9q475h1rki53100zml75vxsykzyhrn70hidy41s5c2rc8r6bh";
|
2005-08-30 14:56:15 +01:00
|
|
|
};
|
2009-02-12 19:04:44 +00:00
|
|
|
|
2015-09-18 05:09:04 +01:00
|
|
|
patches = [
|
|
|
|
(fetchpatch {
|
|
|
|
name = "CVE-2015-1197-cpio-2.12.patch";
|
|
|
|
url = "https://gist.github.com/nckx/70b0bfa80ddfb86c2967/"
|
|
|
|
+ "raw/e9b40d4d4b701f584f826775b75beb10751dc884/"
|
|
|
|
+ "CVE-2015-1197-cpio-2.12.patch";
|
|
|
|
sha256 = "0ph43m4lavwkc4gnl5h9p3da4kb1pnhwk5l2qsky70dqri8pcr8v";
|
|
|
|
})
|
2016-02-26 15:50:24 +00:00
|
|
|
|
|
|
|
# Report: http://www.openwall.com/lists/oss-security/2016/01/19/4
|
|
|
|
# Patch from https://lists.gnu.org/archive/html/bug-cpio/2016-01/msg00005.html
|
|
|
|
./CVE-2016-2037-out-of-bounds-write.patch
|
2015-09-18 05:09:04 +01:00
|
|
|
];
|
2015-02-26 20:24:45 +00:00
|
|
|
|
2014-10-23 19:10:12 +01:00
|
|
|
preConfigure = if stdenv.isCygwin then ''
|
|
|
|
sed -i gnu/fpending.h -e 's,include <stdio_ext.h>,,'
|
|
|
|
'' else null;
|
|
|
|
|
2015-09-18 05:04:49 +01:00
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
2018-08-15 19:20:08 +01:00
|
|
|
meta = with stdenv.lib; {
|
2018-12-01 18:22:13 +00:00
|
|
|
homepage = https://www.gnu.org/software/cpio/;
|
2010-08-03 11:55:58 +01:00
|
|
|
description = "A program to create or extract from cpio archives";
|
2018-08-15 19:20:08 +01:00
|
|
|
license = licenses.gpl3;
|
|
|
|
platforms = platforms.all;
|
2015-08-24 23:37:54 +01:00
|
|
|
priority = 6; # resolves collision with gnutar's "libexec/rmt"
|
2009-02-12 19:04:44 +00:00
|
|
|
};
|
2005-08-30 14:56:15 +01:00
|
|
|
}
|