aboutsummaryrefslogtreecommitdiff
path: root/tests/ui.scm
diff options
context:
space:
mode:
authorTimothy Sample <samplet@ngyro.com>2019-10-31 10:23:09 -0400
committerTimothy Sample <samplet@ngyro.com>2019-11-20 20:48:13 -0500
commitabbe5a2a47860703477ef019e3f33f368e090027 (patch)
tree951ffb475b5a69ca13292835b079e4aa2194c843 /tests/ui.scm
parenta47ef464ce051fd6860d0b45b7f4016ddbc1ebf5 (diff)
downloadguix-abbe5a2a47860703477ef019e3f33f368e090027.tar.gz
guix-abbe5a2a47860703477ef019e3f33f368e090027.zip
gnu: ghc-hspec: Update to 2.7.1.
* gnu/packages/haskell-check.scm (ghc-hspec): Update to 2.7.1.
Diffstat (limited to 'tests/ui.scm')
0 files changed, 0 insertions, 0 deletions
al) [native-inputs]: Add bison, flex and pkg-config. [inputs]: Remove mit-krb5. Add libcap-ng and openldap. Signed-off-by: Maxim Cournoyer <maxim.cournoyer@gmail.com> Modified-by: Maxim Cournoyer <maxim.cournoyer@gmail.com> 2023-04-11gnu: heimdal: Apply patch to fix CVE-2022-45142.Felix Lechner Several recent Heimdal releases are affected by the serious vulnerability CVE-2022-45142, which NIST scored as "7.5 HIGH". [1] At the time of writing, the upstream developers had not yet cut any releases post-7.8.0, which is why the patch is being applied here. The patch was extracted from Helmut Grohne's public vulnerability disclosure. [2] [1] https://nvd.nist.gov/vuln/detail/CVE-2022-45142 [2] https://www.openwall.com/lists/oss-security/2023/02/08/1 * gnu/packages/patches/heimdal-CVE-2022-45142.patch: New patch. * gnu/local.mk (dist_patch_DATA): Register it. * gnu/packages/kerberos.scm (heimdal)[source]: Apply it. Signed-off-by: Maxim Cournoyer <maxim.cournoyer@gmail.com> 2023-04-11gnu: heimdal: Update to 7.8.0 [fixes CVE-2022-44640].Felix Lechner * gnu/packages/kerberos.scm (heimdal): Update to 7.8.0. [source]: Adjust date in snippet. [native-inputs]: Add python. Remove perl. Signed-off-by: Maxim Cournoyer <maxim.cournoyer@gmail.com> Modified-by: Maxim Cournoyer <maxim.cournoyer@gmail.com>