gnu: tar: Fix CVE-2016-6321.
[jackhill/guix/guix.git] / gnu / local.mk
index 1b2bb47..00f47e3 100644 (file)
@@ -399,6 +399,7 @@ GNU_SYSTEM_MODULES =                                \
   %D%/services/admin.scm                       \
   %D%/services/avahi.scm                       \
   %D%/services/base.scm                                \
+  %D%/services/configuration.scm               \
   %D%/services/cups.scm                                \
   %D%/services/databases.scm                   \
   %D%/services/dbus.scm                                \
@@ -505,6 +506,7 @@ dist_patch_DATA =                                           \
   %D%/packages/patches/cssc-missing-include.patch               \
   %D%/packages/patches/clucene-contribs-lib.patch               \
   %D%/packages/patches/cursynth-wave-rand.patch                        \
+  %D%/packages/patches/cyrus-sasl-CVE-2013-4122.patch          \
   %D%/packages/patches/dbus-helper-search-path.patch           \
   %D%/packages/patches/devil-CVE-2009-3994.patch               \
   %D%/packages/patches/devil-fix-libpng.patch                  \
@@ -534,7 +536,6 @@ dist_patch_DATA =                                           \
   %D%/packages/patches/fasthenry-spFactor.patch                        \
   %D%/packages/patches/findutils-localstatedir.patch           \
   %D%/packages/patches/findutils-test-xargs.patch              \
-  %D%/packages/patches/flex-CVE-2016-6354.patch                        \
   %D%/packages/patches/flint-ldconfig.patch                    \
   %D%/packages/patches/fltk-shared-lib-defines.patch           \
   %D%/packages/patches/fltk-xfont-on-demand.patch              \
@@ -545,6 +546,7 @@ dist_patch_DATA =                                           \
   %D%/packages/patches/gcc-arm-bug-71399.patch                 \
   %D%/packages/patches/gcc-arm-link-spec-fix.patch             \
   %D%/packages/patches/gcc-cross-environment-variables.patch   \
+  %D%/packages/patches/gcc-libiberty-printf-decl.patch         \
   %D%/packages/patches/gcc-libvtv-runpath.patch                        \
   %D%/packages/patches/gcc-strmov-store-file-names.patch       \
   %D%/packages/patches/gcc-5.0-libvtv-runpath.patch            \
@@ -584,6 +586,10 @@ dist_patch_DATA =                                          \
   %D%/packages/patches/grub-gets-undeclared.patch              \
   %D%/packages/patches/grub-freetype.patch                     \
   %D%/packages/patches/gsl-test-i686.patch                     \
+  %D%/packages/patches/gst-plugins-good-fix-crashes.patch      \
+  %D%/packages/patches/gst-plugins-good-fix-invalid-read.patch \
+  %D%/packages/patches/gst-plugins-good-fix-signedness.patch   \
+  %D%/packages/patches/gst-plugins-good-flic-bounds-check.patch        \
   %D%/packages/patches/guile-1.8-cpp-4.5.patch                 \
   %D%/packages/patches/guile-arm-fixes.patch                   \
   %D%/packages/patches/guile-default-utf8.patch                        \
@@ -641,10 +647,6 @@ dist_patch_DATA =                                          \
   %D%/packages/patches/liba52-link-with-libm.patch             \
   %D%/packages/patches/liba52-set-soname.patch                 \
   %D%/packages/patches/liba52-use-mtune-not-mcpu.patch         \
-  %D%/packages/patches/libarchive-7zip-heap-overflow.patch     \
-  %D%/packages/patches/libarchive-fix-symlink-check.patch      \
-  %D%/packages/patches/libarchive-fix-filesystem-attacks.patch \
-  %D%/packages/patches/libarchive-safe_fprintf-buffer-overflow.patch   \
   %D%/packages/patches/libbonobo-activation-test-race.patch    \
   %D%/packages/patches/libcanberra-sound-theme-freedesktop.patch \
   %D%/packages/patches/libcmis-fix-test-onedrive.patch         \
@@ -663,16 +665,6 @@ dist_patch_DATA =                                          \
   %D%/packages/patches/libssh-0.6.5-CVE-2016-0739.patch                \
   %D%/packages/patches/libtar-CVE-2013-4420.patch \
   %D%/packages/patches/libtheora-config-guess.patch            \
-  %D%/packages/patches/libtiff-CVE-2015-8665+CVE-2015-8683.patch \
-  %D%/packages/patches/libtiff-CVE-2016-3623.patch             \
-  %D%/packages/patches/libtiff-CVE-2016-3945.patch             \
-  %D%/packages/patches/libtiff-CVE-2016-3990.patch             \
-  %D%/packages/patches/libtiff-CVE-2016-3991.patch             \
-  %D%/packages/patches/libtiff-CVE-2016-5314.patch             \
-  %D%/packages/patches/libtiff-CVE-2016-5321.patch             \
-  %D%/packages/patches/libtiff-CVE-2016-5323.patch             \
-  %D%/packages/patches/libtiff-oob-accesses-in-decode.patch    \
-  %D%/packages/patches/libtiff-oob-write-in-nextdecode.patch   \
   %D%/packages/patches/libtool-skip-tests2.patch               \
   %D%/packages/patches/libunwind-CVE-2015-3239.patch           \
   %D%/packages/patches/libupnp-CVE-2016-6255.patch             \
@@ -865,6 +857,7 @@ dist_patch_DATA =                                           \
   %D%/packages/patches/t1lib-CVE-2010-2642.patch               \
   %D%/packages/patches/t1lib-CVE-2011-0764.patch               \
   %D%/packages/patches/t1lib-CVE-2011-1552+CVE-2011-1553+CVE-2011-1554.patch           \
+  %D%/packages/patches/tar-CVE-2016-6321.patch                 \
   %D%/packages/patches/tar-skip-unreliable-tests.patch         \
   %D%/packages/patches/tcl-mkindex-deterministic.patch         \
   %D%/packages/patches/tclxml-3.2-install.patch                        \