cyrus_sasl: add patch for CVE-2019-19906

sourced from debian as patch isn't even in upstream master yet.
This commit is contained in:
Robert Scott 2019-12-29 20:41:00 +00:00 committed by Frederik Rietdijk
parent c93355bb4a
commit 302a77a02c

View File

@ -1,6 +1,6 @@
{ lib, stdenv, fetchurl, openssl, openldap, kerberos, db, gettext { lib, stdenv, fetchurl, openssl, openldap, kerberos, db, gettext
, pam, fixDarwinDylibNames, autoreconfHook, enableLdap ? false , pam, fixDarwinDylibNames, autoreconfHook, enableLdap ? false
, buildPackages, pruneLibtoolFiles }: , buildPackages, pruneLibtoolFiles, fetchpatch }:
with stdenv.lib; with stdenv.lib;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -27,6 +27,11 @@ stdenv.mkDerivation rec {
patches = [ patches = [
./missing-size_t.patch # https://bugzilla.redhat.com/show_bug.cgi?id=906519 ./missing-size_t.patch # https://bugzilla.redhat.com/show_bug.cgi?id=906519
./cyrus-sasl-ac-try-run-fix.patch ./cyrus-sasl-ac-try-run-fix.patch
(fetchpatch {
name = "CVE-2019-19906.patch";
url = "https://sources.debian.org/data/main/c/cyrus-sasl2/2.1.27+dfsg-1+deb10u1/debian/patches/0021-CVE-2019-19906.patch";
sha256 = "1n4c5wg7l9j8rlbvx8i605j5d39xmj5wm618k8acxl4fmglcmfls";
})
]; ];
configureFlags = [ configureFlags = [