From: Nicolas Graves via Guix-patches via <guix-patches@gnu.org>
To: 74050@debbugs.gnu.org
Cc: Nicolas Graves <ngraves@ngraves.fr>
Subject: [bug#74050] [PATCH 3/6] gnu: upx: Update to 4.2.4.
Date: Sun, 27 Oct 2024 19:31:32 +0100 [thread overview]
Message-ID: <20241027183141.28120-3-ngraves@ngraves.fr> (raw)
In-Reply-To: <20241027183141.28120-1-ngraves@ngraves.fr>
* gnu/packages/compression.scm (upx): Update to 4.2.4.
[properties]: Add lint-hidden-cve property.
---
gnu/packages/compression.scm | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/gnu/packages/compression.scm b/gnu/packages/compression.scm
index 97696ff0ef..a32b15a64a 100644
--- a/gnu/packages/compression.scm
+++ b/gnu/packages/compression.scm
@@ -2438,15 +2438,14 @@ (define-public ucl
(define-public upx
(package
(name "upx")
- (version "4.1.0")
+ (version "4.2.4")
(source
(origin
(method url-fetch)
(uri (string-append "https://github.com/upx/upx/releases/download/v"
version "/upx-" version "-src.tar.xz"))
(sha256
- (base32
- "1l273pwa573x9l3izw75cz8ysn2g8w8w3s56rahppa3ya65zg0h5"))))
+ (base32 "1i71p03861hlf5x1w217l67zm5inm449zhbg6kpv8zyj0wb5dmjy"))))
(build-system cmake-build-system)
(home-page "https://upx.github.io/")
(synopsis "Compression tool for executables")
@@ -2455,6 +2454,8 @@ (define-public upx
compressor. UPX typically reduces the file size of programs and shared
libraries by around 50%--70%, thus reducing disk space, network load times,
download times, and other distribution and storage costs.")
+ ;; These CVEs have been fixed since 4.0.2 but are still linted.
+ (properties `((lint-hidden-cve . ("CVE-2023-23456" "CVE-2023-23457"))))
(license license:gpl2+)))
(define-public quazip-0
--
2.46.0
next prev parent reply other threads:[~2024-10-27 18:33 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-27 18:22 [bug#74050] [PATCH 0/6] Add lint-hidden-cve property for near-leaf packages Nicolas Graves via Guix-patches via
2024-10-27 18:31 ` [bug#74050] [PATCH 1/6] gnu: gerbv: Add lint-hidden-cve property Nicolas Graves via Guix-patches via
2024-10-27 18:31 ` [bug#74050] [PATCH 2/6] gnu: libgda: Rename patch for guix lint Nicolas Graves via Guix-patches via
2024-10-27 18:31 ` Nicolas Graves via Guix-patches via [this message]
2024-10-27 18:31 ` [bug#74050] [PATCH 4/6] gnu: sylpheed: Add release-monitoring-url property Nicolas Graves via Guix-patches via
2024-10-27 18:31 ` [bug#74050] [PATCH 5/6] gnu: openvswitch: Update to 3.4.0 Nicolas Graves via Guix-patches via
2024-10-27 18:31 ` [bug#74050] [PATCH 6/6] gnu: quagga: Fix build and hide CVE Nicolas Graves via Guix-patches via
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20241027183141.28120-3-ngraves@ngraves.fr \
--to=guix-patches@gnu.org \
--cc=74050@debbugs.gnu.org \
--cc=ngraves@ngraves.fr \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.