Merge pull request #174029 from LeSuisse/cifs-utils-6.15

cifs-utils: 6.14 -> 6.15

authored by

Martin Weinelt and committed by
GitHub
b4924b9a f1e15661

+3 -19
+3 -19
pkgs/os-specific/linux/cifs-utils/default.nix
··· 1 - { stdenv, lib, fetchurl, fetchpatch, autoreconfHook, docutils, pkg-config 1 + { stdenv, lib, fetchurl, autoreconfHook, docutils, pkg-config 2 2 , libkrb5, keyutils, pam, talloc, python3 }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "cifs-utils"; 6 - version = "6.14"; 6 + version = "6.15"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://samba/pub/linux-cifs/cifs-utils/${pname}-${version}.tar.bz2"; 10 - sha256 = "sha256-ZgnoB0tUISlf8BKjHwLM2aBYQVxhnIE2Lrt4jb8HVrg="; 10 + sha256 = "sha256-p7aUDpMlDBZ2pvpmturZG3jNQ6X+6ZzEYkWci5zx5vQ="; 11 11 }; 12 - 13 - patches = [ 14 - (fetchpatch { 15 - # Fix buffer-overflow in handling of ip= parameter in mount.cifs 16 - # https://www.openwall.com/lists/oss-security/2022/04/27/5 17 - name = "CVE-2022-27239.patch"; 18 - url = "https://github.com/piastry/cifs-utils/commit/007c07fd91b6d42f8bd45187cf78ebb06801139d.patch"; 19 - sha256 = "sha256-3uoHso2q17r2bcEW+ZjYUWsW4OIGYA7kxYZxQQy0JOg="; 20 - }) 21 - (fetchpatch { 22 - # Fix disclosure of invalid credential configuration in verbose mode 23 - name = "CVE-2022-29869.patch"; 24 - url = "https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379.patch"; 25 - sha256 = "sha256-MjfreeL1ME550EYK9LPOUAAjIk1BoMGfb+pQe3A1bz8="; 26 - }) 27 - ]; 28 12 29 13 nativeBuildInputs = [ autoreconfHook docutils pkg-config ]; 30 14