Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7bb2e7e0f691
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 788764b193f6
Choose a head ref
  • 1 commit
  • 1 file changed
  • 1 contributor

Commits on Jun 18, 2020

  1. transmission: patch CVE-2018-10756

    nixpkgs master is not vulnerable to this.  We use Fedora patch,
    as the upstream one does not apply to this version.
    Fixes #91026 (roundup issue).
    vcunat committed Jun 18, 2020

    Verified

    This commit was signed with the committer’s verified signature.
    colemickens Cole Mickens
    Copy the full SHA
    788764b View commit details
Showing with 11 additions and 1 deletion.
  1. +11 −1 pkgs/applications/networking/p2p/transmission/default.nix
12 changes: 11 additions & 1 deletion pkgs/applications/networking/p2p/transmission/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchurl, pkgconfig, intltool, file, wrapGAppsHook
{ stdenv, fetchurl, fetchpatch, pkgconfig, intltool, file, wrapGAppsHook
, openssl, curl, libevent, inotify-tools, systemd, zlib
, enableGTK3 ? false, gtk3
, enableSystemd ? stdenv.isLinux
@@ -24,6 +24,16 @@ stdenv.mkDerivation rec {
++ optionals enableSystemd [ systemd ]
++ optionals stdenv.isLinux [ inotify-tools ];

patches = [
(fetchpatch {
name = "cve-2018-10756.diff";
url = "https://src.fedoraproject.org/rpms/transmission/raw/ec98cd40/f/"
+ "2123adf8e5e1c2b48791f9d22fc8c747e974180e.patch";
extraPrefix = "./"; # this way we don't need to add -p0 flag
sha256 = "1wq2sk81yyi8ida4115f9mpkna63dijkx8vphac72w2fhpz905k7";
})
];

postPatch = ''
substituteInPlace ./configure \
--replace "libsystemd-daemon" "libsystemd" \