From 3f898ed15a4bc20a14687b2384bd991ad7837d6c Mon Sep 17 00:00:00 2001 From: AndersonTorres Date: Tue, 10 May 2022 07:40:51 -0300 Subject: [PATCH] eterm: reformat knownVulnerabilities message Also, with a link to CVE entry --- pkgs/applications/terminal-emulators/eterm/default.nix | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/terminal-emulators/eterm/default.nix b/pkgs/applications/terminal-emulators/eterm/default.nix index 769104fea431..a0bccbfcb1ed 100644 --- a/pkgs/applications/terminal-emulators/eterm/default.nix +++ b/pkgs/applications/terminal-emulators/eterm/default.nix @@ -13,7 +13,7 @@ stdenv.mkDerivation rec { pname = "eterm"; - version = "0.9.6-unstable=2020-03-03"; + version = "0.9.6+date=2020-03-03"; src = fetchFromGitHub { owner = "mej"; @@ -43,7 +43,10 @@ stdenv.mkDerivation rec { maintainers = [ maintainers.AndersonTorres ]; platforms = platforms.linux; knownVulnerabilities = [ - "Usage of ANSI escape sequences causes unexpected newline-termination, leading to unexpected command execution (https://www.openwall.com/lists/oss-security/2021/05/17/1)" + ''Usage of ANSI escape sequences causes unexpected newline-termination, + leading to unexpected command execution. More info at: + - https://www.cve.org/CVERecord?id=CVE-2021-33477 + - https://www.openwall.com/lists/oss-security/2021/05/17/1'' ]; }; }