srtp: 1.5.2 -> 1.5.4 for CVE-2015-6360

Prevent potential DoS attack due to lack of bounds
checking on RTP header CSRC count and extension header
length. Credit goes to Randell Jesup and the Firefox team
for reporting this issue.

https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6171eb07-d8a9-11e5-b2bd-002590263bf5
This commit is contained in:
Graham Christensen 2016-04-03 09:07:33 -05:00
parent 6b69564af4
commit 00eb2a0a90

View File

@ -5,13 +5,13 @@
with stdenv.lib; with stdenv.lib;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "libsrtp-${version}"; name = "libsrtp-${version}";
version = "1.5.2"; version = "1.5.4";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "cisco"; owner = "cisco";
repo = "libsrtp"; repo = "libsrtp";
rev = "v${version}"; rev = "v${version}";
sha256 = "0iy1il72gnjcwbi16wf4kzdqs1xx8is9qvs6m49pg37218s26gdw"; sha256 = "0s029m4iw0nsvnsm2hlz8yajrasdvf315iv2dw8mfm7nhbshwsqa";
}; };
buildInputs = [ pkgconfig ]; buildInputs = [ pkgconfig ];
@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
] ++ optional (openssl != null) "--enable-openssl"; ] ++ optional (openssl != null) "--enable-openssl";
postInstall = '' postInstall = ''
rmdir $out/bin rm -rf $out/bin
''; '';
meta = { meta = {