wget: verify cookie domains with libpsl
Reduces vulnerability to "supercookie" attacks: <http://comments.gmane.org/gmane.comp.web.wget.general/12820>
This commit is contained in:
parent
72d925f7ef
commit
0db1bb5bda
@ -1,6 +1,6 @@
|
|||||||
{ stdenv, fetchurl, gettext, libidn
|
{ stdenv, fetchurl, gettext, libidn
|
||||||
, perl, perlPackages, LWP, python3
|
, perl, perlPackages, LWP, python3
|
||||||
, libiconv, gnutls ? null }:
|
, libiconv, libpsl, gnutls ? null }:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "wget-1.16";
|
name = "wget-1.16";
|
||||||
@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
|
|||||||
'';
|
'';
|
||||||
|
|
||||||
nativeBuildInputs = [ gettext ];
|
nativeBuildInputs = [ gettext ];
|
||||||
buildInputs = [ libidn libiconv ]
|
buildInputs = [ libidn libiconv libpsl ]
|
||||||
++ stdenv.lib.optionals doCheck [ perl perlPackages.IOSocketSSL LWP python3 ]
|
++ stdenv.lib.optionals doCheck [ perl perlPackages.IOSocketSSL LWP python3 ]
|
||||||
++ stdenv.lib.optional (gnutls != null) gnutls
|
++ stdenv.lib.optional (gnutls != null) gnutls
|
||||||
++ stdenv.lib.optional stdenv.isDarwin perl;
|
++ stdenv.lib.optional stdenv.isDarwin perl;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user