Skip to content

Commit 220bfa9

Browse files
authored
gradle_6: mark very insecure (#352236)
2 parents 52a9f20 + 161e9a3 commit 220bfa9

File tree

1 file changed

+12
-2
lines changed
  • pkgs/development/tools/build-managers/gradle

1 file changed

+12
-2
lines changed

pkgs/development/tools/build-managers/gradle/default.nix

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,11 @@ rec {
2323
"x86_64-darwin"
2424
"x86_64-linux"
2525
"x86_64-windows"
26-
]
26+
],
27+
28+
# Extra attributes to be merged into the resulting derivation's
29+
# meta attribute.
30+
meta ? {}
2731
}:
2832

2933
{ lib
@@ -172,7 +176,7 @@ rec {
172176
license = licenses.asl20;
173177
maintainers = with maintainers; [ lorenzleutgeb liff ];
174178
mainProgram = "gradle";
175-
};
179+
} // meta;
176180
});
177181

178182
# NOTE: Default JDKs that are hardcoded below must be LTS versions
@@ -195,6 +199,12 @@ rec {
195199
version = "6.9.4";
196200
hash = "sha256-PiQCKFON6fGHcqV06ZoLqVnoPW7zUQFDgazZYxeBOJo=";
197201
defaultJava = jdk11;
202+
meta.knownVulnerabilities = [
203+
"CVE-2021-29429: '[...]files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle[...]'"
204+
"CVE-2021-29427: '[...]there is a vulnerability which can lead to information disclosure and/or dependency poisoning[...] In some cases, Gradle may ignore content filters and search all repositories for dependencies. This only occurs when repository content filtering is used from within a `pluginManagement` block in a settings file.'"
205+
"CVE-2021-29428: '[...]the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating files in the system temporary directory.'"
206+
"CVE-2021-32751: '[...]start scripts generated by the `application` plugin and the `gradlew` script are both vulnerable to arbitrary code execution when an attacker is able to change environment variables for the user running the script[...]'"
207+
];
198208
};
199209

200210
wrapGradle = {

0 commit comments

Comments
 (0)