aboutsummaryrefslogtreecommitdiff
path: root/pkgs/development/libraries/spice
diff options
context:
space:
mode:
authorDan Peebles <pumpkin@me.com>2018-02-08 16:38:06 -0500
committerDan Peebles <pumpkin@me.com>2018-02-08 16:38:08 -0500
commitdfd300c81dfb7292d26cfbce3df9717ea408e410 (patch)
tree4ae0e9ebc3960ff3ebe9fc3069a68be9b6b177d0 /pkgs/development/libraries/spice
parent693ab60bb4f7e2cf542cd87f23cfd4b0bf5d110a (diff)
treewide: s/pkgs.fedoraproject.org/src.fedoraproject.org/
Upstream killed the pkgs server but src continues to serve up the exact same content, so we can just point there and all hashes should be unchanged.
Diffstat (limited to 'pkgs/development/libraries/spice')
-rw-r--r--pkgs/development/libraries/spice/default.nix4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/development/libraries/spice/default.nix b/pkgs/development/libraries/spice/default.nix
index 808bfd4f811d..c8e98d3d28ed 100644
--- a/pkgs/development/libraries/spice/default.nix
+++ b/pkgs/development/libraries/spice/default.nix
@@ -17,12 +17,12 @@ stdenv.mkDerivation rec {
# the following three patches fix CVE-2016-9577 and CVE-2016-9578
(fetchpatch {
name = "0001-Prevent-possible-DoS-attempts-during-protocol-handsh.patch";
- url = "http://pkgs.fedoraproject.org/cgit/rpms/spice.git/plain/0001-Prevent-possible-DoS-attempts-during-protocol-handsh.patch?id=d919d639ae5f83a9735a04d843eed675f9357c0d";
+ url = "http://src.fedoraproject.org/cgit/rpms/spice.git/plain/0001-Prevent-possible-DoS-attempts-during-protocol-handsh.patch?id=d919d639ae5f83a9735a04d843eed675f9357c0d";
sha256 = "11x5566lx5zyl7f39glwsgpzkxb7hpcshx8va5ab3imrns07130q";
})
(fetchpatch {
name = "0002-Prevent-integer-overflows-in-capability-checks.patch";
- url = "http://pkgs.fedoraproject.org/cgit/rpms/spice.git/plain/0002-Prevent-integer-overflows-in-capability-checks.patch?id=d919d639ae5f83a9735a04d843eed675f9357c0d";
+ url = "http://src.fedoraproject.org/cgit/rpms/spice.git/plain/0002-Prevent-integer-overflows-in-capability-checks.patch?id=d919d639ae5f83a9735a04d843eed675f9357c0d";
sha256 = "1r1bhq98w93cvvrlrz6jwdfsy261xl3xqs0ppchaa2igyxvxv5z5";
})
(fetchpatch {