From fd2cff94796fdc7b9a2f816403de2496cf76d0d7 Mon Sep 17 00:00:00 2001 From: aszlig Date: Fri, 8 Feb 2013 08:48:50 +0100 Subject: [PATCH] curl: Update to version 7.29.0. This version contains a security fix for CVE-2013-0249, for details please have a look at: http://curl.haxx.se/docs/adv_20130206.html Thanks to @roconnor for pointing this out. I'm pushing this to stdenv-updates because I'm not quite sure if it will break other things because 7.29.0 is now non-blocking by default. Plus the security vulnerability only affects IMAP, POP3 and SMTP protocol support. Signed-off-by: aszlig Cherry-picked into master, this won't change stdenv. Signed-off-by: Shea Levy --- pkgs/tools/networking/curl/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/networking/curl/default.nix b/pkgs/tools/networking/curl/default.nix index 028b672380cf..bf6aaa249d0b 100644 --- a/pkgs/tools/networking/curl/default.nix +++ b/pkgs/tools/networking/curl/default.nix @@ -10,11 +10,11 @@ assert sslSupport -> openssl != null; assert scpSupport -> libssh2 != null; stdenv.mkDerivation rec { - name = "curl-7.28.0"; + name = "curl-7.29.0"; src = fetchurl { url = "http://curl.haxx.se/download/${name}.tar.bz2"; - sha256 = "b7f510db60f520ba0bc8a39cccee7e913362205b4a7709e16af2cba14093099b"; + sha256 = "0bw3sclhjqb2zwgcp6njjpaca62rwlj2mrw2r9wic47sqsxfhy4x"; }; # Zlib and OpenSSL must be propagated because `libcurl.la' contains