95 lines
3.4 KiB
Nix
95 lines
3.4 KiB
Nix
{ stdenv, lib, fetchurl, fetchpatch, alsaLib, AudioUnit, CoreServices }:
|
|
|
|
let
|
|
|
|
fetchDebianPatch = { name, debname, sha256 }:
|
|
fetchpatch {
|
|
inherit sha256 name;
|
|
url = "https://salsa.debian.org/multimedia-team/audiofile/raw/debian/0.3.6-4/debian/patches/${debname}";
|
|
};
|
|
|
|
in
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "audiofile-0.3.6";
|
|
|
|
buildInputs =
|
|
lib.optionals stdenv.isLinux [
|
|
alsaLib
|
|
] ++ lib.optionals stdenv.isDarwin [
|
|
CoreServices AudioUnit
|
|
];
|
|
|
|
src = fetchurl {
|
|
url = "https://audiofile.68k.org/${name}.tar.gz";
|
|
sha256 = "0rb927zknk9kmhprd8rdr4azql4gn2dp75a36iazx2xhkbqhvind";
|
|
};
|
|
|
|
# fix build with gcc9
|
|
NIX_CFLAGS_LINK = lib.optional (stdenv.system == "i686-linux") "-lgcc";
|
|
|
|
# Even when statically linking, libstdc++.la is put in dependency_libs here,
|
|
# and hence libstdc++.so passed to the linker, just pass -lstdc++ and let the
|
|
# compiler do what it does best. (libaudiofile.la is a generated file, so we
|
|
# have to run `make` that far first).
|
|
#
|
|
# Without this, the executables in this package (sfcommands and examples)
|
|
# fail to build: https://github.com/NixOS/nixpkgs/issues/103215
|
|
#
|
|
# There might be a more sensible way to do this with autotools, but I am not
|
|
# smart enough to discover it.
|
|
preBuild = lib.optionalString stdenv.hostPlatform.isStatic ''
|
|
make -C libaudiofile $makeFlags
|
|
sed -i "s/dependency_libs=.*/dependency_libs=' -lstdc++'/" libaudiofile/libaudiofile.la
|
|
'';
|
|
|
|
patches = [
|
|
./gcc-6.patch
|
|
./CVE-2015-7747.patch
|
|
|
|
(fetchDebianPatch {
|
|
name = "CVE-2017-6829.patch";
|
|
debname = "04_clamp-index-values-to-fix-index-overflow-in-IMA.cpp.patch";
|
|
sha256 = "04qxl51i64c53v69q2kx61qdq474f4vapk8rq97cipj7yrar392m";
|
|
})
|
|
(fetchDebianPatch {
|
|
name = "CVE-2017-6827+CVE-2017-6828+CVE-2017-6832+CVE-2017-6835+CVE-2017-6837.patch";
|
|
debname = "05_Always-check-the-number-of-coefficients.patch";
|
|
sha256 = "1ih03kfkabffi6ymp6832q470i28rsds78941vzqlshnqjb2nnxw";
|
|
})
|
|
(fetchDebianPatch {
|
|
name = "CVE-2017-6839.patch";
|
|
debname = "06_Check-for-multiplication-overflow-in-MSADPCM-decodeSam.patch";
|
|
sha256 = "0a8s2z8rljlj03p7l1is9s4fml8vyzvyvfrh1m6xj5a8vbi635d0";
|
|
})
|
|
(fetchDebianPatch {
|
|
name = "CVE-2017-6830+CVE-2017-6834+CVE-2017-6836+CVE-2017-6838.patch";
|
|
debname = "07_Check-for-multiplication-overflow-in-sfconvert.patch";
|
|
sha256 = "0rfba8rkasl5ycvc0kqlzinkl3rvyrrjvjhpc45h423wmjk2za2l";
|
|
})
|
|
(fetchDebianPatch {
|
|
name = "audiofile-fix-multiplyCheckOverflow-signature.patch";
|
|
debname = "08_Fix-signature-of-multiplyCheckOverflow.-It-returns-a-b.patch";
|
|
sha256 = "032p5jqp7q7jgc5axdnazz00zm7hd26z6m5j55ifs0sykr5lwldb";
|
|
})
|
|
(fetchDebianPatch {
|
|
name = "CVE-2017-6831.patch";
|
|
debname = "09_Actually-fail-when-error-occurs-in-parseFormat.patch";
|
|
sha256 = "0csikmj8cbiy6cigg0rmh67jrr0sgm56dfrnrxnac3m9635nxlac";
|
|
})
|
|
(fetchDebianPatch {
|
|
name = "CVE-2017-6833.patch";
|
|
debname = "10_Check-for-division-by-zero-in-BlockCodec-runPull.patch";
|
|
sha256 = "1rlislkjawq98bbcf1dgl741zd508wwsg85r37ca7pfdf6wgl6z7";
|
|
})
|
|
];
|
|
|
|
meta = with lib; {
|
|
description = "Library for reading and writing audio files in various formats";
|
|
homepage = "http://www.68k.org/~michael/audiofile/";
|
|
license = licenses.lgpl21Plus;
|
|
maintainers = with maintainers; [ lovek323 ];
|
|
platforms = platforms.unix;
|
|
};
|
|
}
|