2017-11-19 17:25:57 +00:00
|
|
|
{ stdenv, fetchurl, fetchpatch, alsaLib, AudioUnit, CoreServices }:
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
fetchDebianPatch = { name, debname, sha256 }:
|
|
|
|
fetchpatch {
|
|
|
|
inherit sha256 name;
|
|
|
|
url = "https://anonscm.debian.org/cgit/pkg-multimedia/audiofile.git/plain/debian/patches/${debname}?h=debian/0.3.6-4";
|
|
|
|
};
|
|
|
|
|
|
|
|
in
|
2012-03-20 04:41:13 +00:00
|
|
|
|
|
|
|
stdenv.mkDerivation rec {
|
2013-12-18 12:02:25 +00:00
|
|
|
name = "audiofile-0.3.6";
|
2012-03-20 04:41:13 +00:00
|
|
|
|
2017-09-22 04:23:17 +01:00
|
|
|
buildInputs =
|
|
|
|
stdenv.lib.optionals stdenv.isLinux [
|
|
|
|
alsaLib
|
|
|
|
] ++ stdenv.lib.optionals stdenv.isDarwin [
|
|
|
|
CoreServices AudioUnit
|
|
|
|
];
|
2016-01-26 14:43:22 +00:00
|
|
|
|
2012-03-20 04:41:13 +00:00
|
|
|
src = fetchurl {
|
|
|
|
url = "http://audiofile.68k.org/${name}.tar.gz";
|
2013-12-18 12:02:25 +00:00
|
|
|
sha256 = "0rb927zknk9kmhprd8rdr4azql4gn2dp75a36iazx2xhkbqhvind";
|
2012-03-20 04:41:13 +00:00
|
|
|
};
|
|
|
|
|
2017-11-19 17:25:57 +00:00
|
|
|
patches = [
|
|
|
|
./gcc-6.patch
|
|
|
|
./CVE-2015-7747.patch
|
|
|
|
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "CVE-2017-6829.patch";
|
|
|
|
debname = "04_clamp-index-values-to-fix-index-overflow-in-IMA.cpp.patch";
|
|
|
|
sha256 = "04qxl51i64c53v69q2kx61qdq474f4vapk8rq97cipj7yrar392m";
|
|
|
|
})
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "CVE-2017-6827+CVE-2017-6828+CVE-2017-6832+CVE-2017-6835+CVE-2017-6837.patch";
|
|
|
|
debname = "05_Always-check-the-number-of-coefficients.patch";
|
|
|
|
sha256 = "1ih03kfkabffi6ymp6832q470i28rsds78941vzqlshnqjb2nnxw";
|
|
|
|
})
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "CVE-2017-6839.patch";
|
|
|
|
debname = "06_Check-for-multiplication-overflow-in-MSADPCM-decodeSam.patch";
|
|
|
|
sha256 = "0a8s2z8rljlj03p7l1is9s4fml8vyzvyvfrh1m6xj5a8vbi635d0";
|
|
|
|
})
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "CVE-2017-6830+CVE-2017-6834+CVE-2017-6836+CVE-2017-6838.patch";
|
|
|
|
debname = "07_Check-for-multiplication-overflow-in-sfconvert.patch";
|
|
|
|
sha256 = "0rfba8rkasl5ycvc0kqlzinkl3rvyrrjvjhpc45h423wmjk2za2l";
|
|
|
|
})
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "audiofile-fix-multiplyCheckOverflow-signature.patch";
|
|
|
|
debname = "08_Fix-signature-of-multiplyCheckOverflow.-It-returns-a-b.patch";
|
|
|
|
sha256 = "032p5jqp7q7jgc5axdnazz00zm7hd26z6m5j55ifs0sykr5lwldb";
|
|
|
|
})
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "CVE-2017-6831.patch";
|
|
|
|
debname = "09_Actually-fail-when-error-occurs-in-parseFormat.patch";
|
|
|
|
sha256 = "0csikmj8cbiy6cigg0rmh67jrr0sgm56dfrnrxnac3m9635nxlac";
|
|
|
|
})
|
|
|
|
(fetchDebianPatch {
|
|
|
|
name = "CVE-2017-6833.patch";
|
|
|
|
debname = "10_Check-for-division-by-zero-in-BlockCodec-runPull.patch";
|
|
|
|
sha256 = "1rlislkjawq98bbcf1dgl741zd508wwsg85r37ca7pfdf6wgl6z7";
|
|
|
|
})
|
|
|
|
];
|
2015-11-04 20:05:44 +00:00
|
|
|
|
2013-07-04 05:52:51 +01:00
|
|
|
meta = with stdenv.lib; {
|
2013-10-05 15:22:46 +01:00
|
|
|
description = "Library for reading and writing audio files in various formats";
|
2016-01-26 14:43:22 +00:00
|
|
|
homepage = http://www.68k.org/~michael/audiofile/;
|
2013-07-14 00:08:03 +01:00
|
|
|
license = licenses.lgpl21Plus;
|
2014-01-22 03:34:41 +00:00
|
|
|
maintainers = with maintainers; [ lovek323 ];
|
2013-07-04 05:52:51 +01:00
|
|
|
platforms = platforms.unix;
|
2012-03-20 04:41:13 +00:00
|
|
|
};
|
|
|
|
}
|