···2323 "x86_64-darwin"
2424 "x86_64-linux"
2525 "x86_64-windows"
2626- ]
2626+ ],
2727+2828+ # Extra attributes to be merged into the resulting derivation's
2929+ # meta attribute.
3030+ meta ? {}
2731 }:
28322933 { lib
···172176 license = licenses.asl20;
173177 maintainers = with maintainers; [ lorenzleutgeb liff ];
174178 mainProgram = "gradle";
175175- };
179179+ } // meta;
176180 });
177181178182 # NOTE: Default JDKs that are hardcoded below must be LTS versions
···195199 version = "6.9.4";
196200 hash = "sha256-PiQCKFON6fGHcqV06ZoLqVnoPW7zUQFDgazZYxeBOJo=";
197201 defaultJava = jdk11;
202202+ meta.knownVulnerabilities = [
203203+ "CVE-2021-29429: '[...]files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle[...]'"
204204+ "CVE-2021-29427: '[...]there is a vulnerability which can lead to information disclosure and/or dependency poisoning[...] In some cases, Gradle may ignore content filters and search all repositories for dependencies. This only occurs when repository content filtering is used from within a `pluginManagement` block in a settings file.'"
205205+ "CVE-2021-29428: '[...]the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory.'"
206206+ "CVE-2021-32751: '[...]start scripts generated by the `application` plugin and the `gradlew` script are both vulnerable to arbitrary code execution when an attacker is able to change environment variables for the user running the script[...]'"
207207+ ];
198208 };
199209200210 wrapGradle = {