From cbada77b0b2acaf85d3ad8dd8462b1b2daa93a0d Mon Sep 17 00:00:00 2001 From: Franz Pletz Date: Wed, 23 Dec 2015 18:28:22 +0100 Subject: [PATCH] clawsMail: 3.13.0 -> 3.13.1 (CVE-2015-8614) Fixes a remotely triggerable buffer overflow. http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557 Close #11910. --- .../networking/mailreaders/claws-mail/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/networking/mailreaders/claws-mail/default.nix b/pkgs/applications/networking/mailreaders/claws-mail/default.nix index bbe3c6b44274..5b3eb2326c5a 100644 --- a/pkgs/applications/networking/mailreaders/claws-mail/default.nix +++ b/pkgs/applications/networking/mailreaders/claws-mail/default.nix @@ -30,7 +30,7 @@ with stdenv.lib; -let version = "3.13.0"; in +let version = "3.13.1"; in stdenv.mkDerivation { name = "claws-mail-${version}"; @@ -45,7 +45,7 @@ stdenv.mkDerivation { src = fetchurl { url = "http://www.claws-mail.org/download.php?file=releases/claws-mail-${version}.tar.xz"; - sha256 = "0fpr9gdgrs5yggm61a6135ca06x0cflddsh8dwfqmpb3dj07cl1n"; + sha256 = "049av7r0xhjjjm1p93l2ns3xisvn125v3ncqar23cqjzgcichg5d"; }; patches = [ ./mime.patch ];