diff options
author | Graham Christensen <graham@grahamc.com> | 2016-04-03 09:07:33 -0500 |
---|---|---|
committer | Graham Christensen <graham@grahamc.com> | 2016-04-03 09:07:33 -0500 |
commit | 00eb2a0a9025e027b50827815e09e323217d0ddd (patch) | |
tree | 197fb907cb4c2c3a8544c9191f6b142df1ecf3e6 /pkgs/development | |
parent | 6b69564af4fdcf39c133dcd019e144337384f8fa (diff) | |
download | nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.tar nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.tar.gz nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.tar.bz2 nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.tar.lz nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.tar.xz nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.tar.zst nixlib-00eb2a0a9025e027b50827815e09e323217d0ddd.zip |
srtp: 1.5.2 -> 1.5.4 for CVE-2015-6360
Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue. https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6171eb07-d8a9-11e5-b2bd-002590263bf5
Diffstat (limited to 'pkgs/development')
-rw-r--r-- | pkgs/development/libraries/srtp/default.nix | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/pkgs/development/libraries/srtp/default.nix b/pkgs/development/libraries/srtp/default.nix index 98cf160e8b51..ba213dc98e76 100644 --- a/pkgs/development/libraries/srtp/default.nix +++ b/pkgs/development/libraries/srtp/default.nix @@ -5,13 +5,13 @@ with stdenv.lib; stdenv.mkDerivation rec { name = "libsrtp-${version}"; - version = "1.5.2"; + version = "1.5.4"; src = fetchFromGitHub { owner = "cisco"; repo = "libsrtp"; rev = "v${version}"; - sha256 = "0iy1il72gnjcwbi16wf4kzdqs1xx8is9qvs6m49pg37218s26gdw"; + sha256 = "0s029m4iw0nsvnsm2hlz8yajrasdvf315iv2dw8mfm7nhbshwsqa"; }; buildInputs = [ pkgconfig ]; @@ -24,7 +24,7 @@ stdenv.mkDerivation rec { ] ++ optional (openssl != null) "--enable-openssl"; postInstall = '' - rmdir $out/bin + rm -rf $out/bin ''; meta = { |