summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniël de Kok <me@danieldk.eu>2020-09-01 08:39:36 +0200
committerDaniël de Kok <me@danieldk.eu>2020-09-01 08:39:36 +0200
commit4b07b00c0de3f6c5755048038ae49c57f86b7e40 (patch)
tree29e1f0a8ebae76a8b6bee2c15fca553192633b92
parent555cb2491c713dfee628d8e7cbc6d153a708a5cf (diff)
adobe-reader: add knownVulnerabilities
We should really avoid that people unknowingly use Adobe Reader, it has literally tens of known high-score code execution vulnerabilities, probably exploited in the wild.
-rw-r--r--pkgs/applications/misc/adobe-reader/default.nix4
1 files changed, 4 insertions, 0 deletions
diff --git a/pkgs/applications/misc/adobe-reader/default.nix b/pkgs/applications/misc/adobe-reader/default.nix
index b67e514ce54d..ecd130426de1 100644
--- a/pkgs/applications/misc/adobe-reader/default.nix
+++ b/pkgs/applications/misc/adobe-reader/default.nix
@@ -28,5 +28,9 @@ stdenv.mkDerivation {
description = "Adobe Reader, a viewer for PDF documents";
homepage = "http://www.adobe.com/products/reader";
license = stdenv.lib.licenses.unfree;
+ knownVulnerabilities = [
+ "Numerous unresolved vulnerabilities"
+ "See: https://www.cvedetails.com/product/497/Adobe-Acrobat-Reader.html?vendor_id=53"
+ ];
};
}