From 8f4f9b62238da74bd3c78fe5708369d543c3e690 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 9 Dec 2017 19:16:36 +0100 Subject: [PATCH] jbig2dec: bugfix 0.13 -> 0.14 Many of the fixes seem to have potential to be vulnerabilities, though most aren't labeled with a CVE number. /cc #32459 --- pkgs/development/libraries/jbig2dec/default.nix | 12 ++---------- 1 file changed, 2 insertions(+), 10 deletions(-) diff --git a/pkgs/development/libraries/jbig2dec/default.nix b/pkgs/development/libraries/jbig2dec/default.nix index 45df4876be1f..8731bd8e7366 100644 --- a/pkgs/development/libraries/jbig2dec/default.nix +++ b/pkgs/development/libraries/jbig2dec/default.nix @@ -1,21 +1,13 @@ { stdenv, fetchurl, fetchpatch }: stdenv.mkDerivation rec { - name = "jbig2dec-0.13"; + name = "jbig2dec-0.14"; src = fetchurl { url = "http://downloads.ghostscript.com/public/jbig2dec/${name}.tar.gz"; - sha256 = "04akiwab8iy5iy34razcvh9mcja9wy737civ3sbjxk4j143s1b2s"; + sha256 = "0k01hp0q4275fj4rbr1gy64svfraw5w7wvwl08yjhvsnpb1rid11"; }; - patches = - [ (fetchpatch { - url = "http://git.ghostscript.com/?p=jbig2dec.git;a=patch;h=e698d5c11d27212aa1098bc5b1673a3378563092"; - sha256 = "1fc8xm1z98xj2zkcl0zj7dpjjsbz3vn61b59jnkhcyzy3iiczv7f"; - name = "CVE-2016-9601.patch"; - }) - ]; - meta = { homepage = https://www.ghostscript.com/jbig2dec.html; description = "Decoder implementation of the JBIG2 image compression format";