about summary refs log tree commit diff
path: root/pkgs/applications
diff options
context:
space:
mode:
authorAndreas Rammhold <andreas@rammhold.de>2020-05-06 23:51:53 +0200
committerGitHub <noreply@github.com>2020-05-06 23:51:53 +0200
commit38d043b116478af3e31d1f7089b351754e4c6226 (patch)
tree7b5568a53fd2f6b0b4262a3ac4fccebe6020a656 /pkgs/applications
parent01539e6f9a7d61b33ad04cc0a03acda736684379 (diff)
parente24f5eab66a004fcbd770888aba9cd94fcda17c5 (diff)
downloadnixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar
nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.gz
nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.bz2
nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.lz
nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.xz
nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.zst
nixlib-38d043b116478af3e31d1f7089b351754e4c6226.zip
Merge pull request #87139 from mweinelt/pr/security-patch-names
treewide: add CVE identifiers to patches
Diffstat (limited to 'pkgs/applications')
-rw-r--r--pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch (renamed from pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c.patch)0
-rw-r--r--pkgs/applications/office/antiword/default.nix2
2 files changed, 1 insertions, 1 deletions
diff --git a/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c.patch b/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch
index ebf2f0900d98..ebf2f0900d98 100644
--- a/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c.patch
+++ b/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch
diff --git a/pkgs/applications/office/antiword/default.nix b/pkgs/applications/office/antiword/default.nix
index 0154e21b374c..c8cb294b0dc0 100644
--- a/pkgs/applications/office/antiword/default.nix
+++ b/pkgs/applications/office/antiword/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation {
     substituteInPlace Makefile --replace "gcc" "cc"
   '';
 
-  patches = [ ./10_fix_buffer_overflow_wordole_c.patch ];
+  patches = [ ./10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch ];
 
   installTargets = [ "global_install" ];