summary refs log tree commit diff
path: root/pkgs/tools/filesystems/fuseiso
diff options
context:
space:
mode:
authorMartin Weinelt <hexa@darmstadt.ccc.de>2020-05-06 23:18:09 +0200
committerMartin Weinelt <hexa@darmstadt.ccc.de>2020-05-06 23:18:09 +0200
commite24f5eab66a004fcbd770888aba9cd94fcda17c5 (patch)
treec0953c3af0ec27b95cab73edb5a98110ff11a117 /pkgs/tools/filesystems/fuseiso
parentf46cbbc540e74a8b3c8ef3099df4c2a0b434e55b (diff)
treewide: add CVE identifiers to patches
This allows tools like broken.sh to correctly identify the patched
status.
Diffstat (limited to 'pkgs/tools/filesystems/fuseiso')
-rw-r--r--pkgs/tools/filesystems/fuseiso/default.nix30
1 files changed, 15 insertions, 15 deletions
diff --git a/pkgs/tools/filesystems/fuseiso/default.nix b/pkgs/tools/filesystems/fuseiso/default.nix
index ded1fac65f884..0a4472d7123df 100644
--- a/pkgs/tools/filesystems/fuseiso/default.nix
+++ b/pkgs/tools/filesystems/fuseiso/default.nix
@@ -9,27 +9,27 @@ stdenv.mkDerivation rec {
     sha256 = "127xql52dcdhmh7s5m9xc6q39jdlj3zhbjar1j821kb6gl3jw94b";
   };
 
-  patches = map (p:
-    fetchpatch {
-      inherit (p) name sha256;
-      url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/${p.name}";
-    }) [
-    {
+  patches = [
+    (fetchpatch {
       name = "00-support_large_iso.patch";
+      url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/00-support_large_iso.patch";
       sha256 = "1lmclb1qwzz5f4wlq693g83bblwnjjl73qhgfxbsaac5hnn2shjw";
-    }
-    {
+    })
+    (fetchpatch {
       name = "01-fix_typo.patch";
+      url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/01-fix_typo.patch";
       sha256 = "14rpxp0yylzsgqv0r19l4wx1h5hvqp617gpv1yg0w48amr9drasa";
-    }
-    { # CVE-2015-8837
-      name = "02-prevent-buffer-overflow.patch";
+    })
+    (fetchpatch {
+      name = "02-prevent-buffer-overflow_CVE-2015-8837.patch";
+      url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/02-prevent-buffer-overflow.patch";
       sha256 = "1ls2pp3mh91pdb51qz1fsd8pwhbky6988bpd156bn7wgfxqzh8ig";
-    }
-    { # CVE-2015-8836
-      name = "03-prevent-integer-overflow.patch";
+    })
+    (fetchpatch {
+      name = "03-prevent-integer-overflow_CVE-2015-8836.patch";
+      url = "https://sources.debian.net/data/main/f/fuseiso/${version}-3.2/debian/patches/03-prevent-integer-overflow.patch";
       sha256 = "100cw07fk4sa3hl7a1gk2hgz4qsxdw99y20r7wpidwwwzy463zcv";
-    }
+    })
   ];
 
   nativeBuildInputs = [ autoreconfHook pkgconfig ];