Hello,
I’ve patched cups/default.nix to update to CUPS 1.4.2 (from CUPS 1.4.1). The
reason was the CVE-2009-2820 vulnerability. The new CUPS seems to have been
built successfully on my machine. However, the whole update process hasn’t
been finished yet since obviously, the CUPS change triggered a rebuilt of large
parts of KDE and Qt.
You find the patch attached to this e-mail. By the way, what are the
preconditions for getting commit rights for the SVN repository?
Best wishes,
Wolfgang
Index: pkgs/misc/cups/default.nix
===================================================================
--- pkgs/misc/cups/default.nix (revision 18644)
+++ pkgs/misc/cups/default.nix (working copy)
@@ -1,22 +1,15 @@
{ stdenv, fetchurl, pkgconfig, zlib, libjpeg, libpng, libtiff, pam, openssl, dbus }:
-let version = "1.4.1"; in
+let version = "1.4.2"; in
stdenv.mkDerivation {
name = "cups-${version}";
src = fetchurl {
url = "http://ftp.easysw.com/pub/cups/${version}/cups-${version}-source.tar.bz2";
- sha256 = "1fnkq993hr8l87x6f7a7wik2spac3f7nn4wksrvwk690r8a6zxng";
+ sha256 = "646bc0dbac064d05c0a93735fb556299eda0ae32ce4568506654cb952c719314";
};
- patches =
- [ (fetchurl {
- url = http://www.cups.org/strfiles/3332/0001-Fixed-side_cb-function-declaration-in-usb-unix.c.patch;
- sha256 = "0h8fhhpzp7xngnc428040jv09yvpz5dxb9hw6sv67lnvb03fncnw";
- })
- ];
-
buildInputs = [ pkgconfig zlib libjpeg libpng libtiff pam dbus ];
propagatedBuildInputs = [ openssl ];
_______________________________________________
nix-dev mailing list
[email protected]
https://mail.cs.uu.nl/mailman/listinfo/nix-dev