diff options
author | David Craven <david@craven.ch> | 2016-10-29 16:48:43 +0200 |
---|---|---|
committer | David Craven <david@craven.ch> | 2016-12-02 21:28:05 +0100 |
commit | 83dcfa72d4d7aadf7c772607a97f6501de106dca (patch) | |
tree | 91f46dad1d9f9f6d269086fc44b74843e88853af /gnu/packages/patches/flex-CVE-2016-6354.patch | |
parent | 7d07e2a5274703ffc1a54dbfe6644fdfb84c32c4 (diff) | |
download | guix-83dcfa72d4d7aadf7c772607a97f6501de106dca.tar guix-83dcfa72d4d7aadf7c772607a97f6501de106dca.tar.gz |
gnu: flex: Update to 2.6.2.
* gnu/packages/flex.scm (flex): Update to 2.6.2.
[native-inputs]: Add help2man.
[origin]: Update uri to github. Remove CVE-2016-6354 patch.
(flex-2.6.1): Remove variable.
* gnu/packages/patches/flex-CVE-2016-6354.patch: Delete file.
* gnu/local.mk (dist_patch_DATA): Update.
* gnu/packages/kde-frameworks.scm (solid, kservice)[native-inputs]: Use
flex.
Diffstat (limited to 'gnu/packages/patches/flex-CVE-2016-6354.patch')
-rw-r--r-- | gnu/packages/patches/flex-CVE-2016-6354.patch | 30 |
1 files changed, 0 insertions, 30 deletions
diff --git a/gnu/packages/patches/flex-CVE-2016-6354.patch b/gnu/packages/patches/flex-CVE-2016-6354.patch deleted file mode 100644 index 1f3cb028d4..0000000000 --- a/gnu/packages/patches/flex-CVE-2016-6354.patch +++ /dev/null @@ -1,30 +0,0 @@ -Fix CVE-2016-6354 (Buffer overflow in generated code (yy_get_next_buffer). - -https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 -https://security-tracker.debian.org/tracker/CVE-2016-6354 - -Patch copied from upstream source repository: -https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466 - -From a5cbe929ac3255d371e698f62dc256afe7006466 Mon Sep 17 00:00:00 2001 -From: Will Estes <westes575@gmail.com> -Date: Sat, 27 Feb 2016 11:56:05 -0500 -Subject: [PATCH] Fixed incorrect integer type - ---- - src/flex.skl | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/flex.skl b/src/flex.skl -index 36a526a..64f853d 100644 ---- a/src/flex.skl -+++ b/src/flex.skl -@@ -1703,7 +1703,7 @@ int yyFlexLexer::yy_get_next_buffer() - - else - { -- yy_size_t num_to_read = -+ int num_to_read = - YY_CURRENT_BUFFER_LVALUE->yy_buf_size - number_to_move - 1; - - while ( num_to_read <= 0 ) |