diff options
author | Andreas Rammhold <andreas@rammhold.de> | 2020-05-06 23:51:53 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-05-06 23:51:53 +0200 |
commit | 38d043b116478af3e31d1f7089b351754e4c6226 (patch) | |
tree | 7b5568a53fd2f6b0b4262a3ac4fccebe6020a656 /pkgs/applications | |
parent | 01539e6f9a7d61b33ad04cc0a03acda736684379 (diff) | |
parent | e24f5eab66a004fcbd770888aba9cd94fcda17c5 (diff) | |
download | nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.gz nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.bz2 nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.lz nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.xz nixlib-38d043b116478af3e31d1f7089b351754e4c6226.tar.zst nixlib-38d043b116478af3e31d1f7089b351754e4c6226.zip |
Merge pull request #87139 from mweinelt/pr/security-patch-names
treewide: add CVE identifiers to patches
Diffstat (limited to 'pkgs/applications')
-rw-r--r-- | pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch (renamed from pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c.patch) | 0 | ||||
-rw-r--r-- | pkgs/applications/office/antiword/default.nix | 2 |
2 files changed, 1 insertions, 1 deletions
diff --git a/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c.patch b/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch index ebf2f0900d98..ebf2f0900d98 100644 --- a/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c.patch +++ b/pkgs/applications/office/antiword/10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch diff --git a/pkgs/applications/office/antiword/default.nix b/pkgs/applications/office/antiword/default.nix index 0154e21b374c..c8cb294b0dc0 100644 --- a/pkgs/applications/office/antiword/default.nix +++ b/pkgs/applications/office/antiword/default.nix @@ -16,7 +16,7 @@ stdenv.mkDerivation { substituteInPlace Makefile --replace "gcc" "cc" ''; - patches = [ ./10_fix_buffer_overflow_wordole_c.patch ]; + patches = [ ./10_fix_buffer_overflow_wordole_c_CVE-2014-8123.patch ]; installTargets = [ "global_install" ]; |