From 00eb2a0a9025e027b50827815e09e323217d0ddd Mon Sep 17 00:00:00 2001 From: Graham Christensen Date: Sun, 3 Apr 2016 09:07:33 -0500 Subject: srtp: 1.5.2 -> 1.5.4 for CVE-2015-6360 Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue. https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6171eb07-d8a9-11e5-b2bd-002590263bf5 --- pkgs/development/libraries/srtp/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'pkgs/development') diff --git a/pkgs/development/libraries/srtp/default.nix b/pkgs/development/libraries/srtp/default.nix index 98cf160e8b51..ba213dc98e76 100644 --- a/pkgs/development/libraries/srtp/default.nix +++ b/pkgs/development/libraries/srtp/default.nix @@ -5,13 +5,13 @@ with stdenv.lib; stdenv.mkDerivation rec { name = "libsrtp-${version}"; - version = "1.5.2"; + version = "1.5.4"; src = fetchFromGitHub { owner = "cisco"; repo = "libsrtp"; rev = "v${version}"; - sha256 = "0iy1il72gnjcwbi16wf4kzdqs1xx8is9qvs6m49pg37218s26gdw"; + sha256 = "0s029m4iw0nsvnsm2hlz8yajrasdvf315iv2dw8mfm7nhbshwsqa"; }; buildInputs = [ pkgconfig ]; @@ -24,7 +24,7 @@ stdenv.mkDerivation rec { ] ++ optional (openssl != null) "--enable-openssl"; postInstall = '' - rmdir $out/bin + rm -rf $out/bin ''; meta = { -- cgit 1.4.1