3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/development/libraries/srtp/default.nix
Graham Christensen 00eb2a0a90 srtp: 1.5.2 -> 1.5.4 for CVE-2015-6360
Prevent potential DoS attack due to lack of bounds
checking on RTP header CSRC count and extension header
length. Credit goes to Randell Jesup and the Firefox team
for reporting this issue.

https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6171eb07-d8a9-11e5-b2bd-002590263bf5
2016-04-03 09:07:33 -05:00

37 lines
807 B
Nix

{ stdenv, fetchFromGitHub, pkgconfig
, openssl ? null, libpcap ? null
}:
with stdenv.lib;
stdenv.mkDerivation rec {
name = "libsrtp-${version}";
version = "1.5.4";
src = fetchFromGitHub {
owner = "cisco";
repo = "libsrtp";
rev = "v${version}";
sha256 = "0s029m4iw0nsvnsm2hlz8yajrasdvf315iv2dw8mfm7nhbshwsqa";
};
buildInputs = [ pkgconfig ];
# libsrtp.pc references -lcrypto -lpcap without -L
propagatedBuildInputs = [ openssl libpcap ];
configureFlags = [
"--disable-debug"
] ++ optional (openssl != null) "--enable-openssl";
postInstall = ''
rm -rf $out/bin
'';
meta = {
homepage = https://github.com/cisco/libsrtp;
description = "Secure RTP (SRTP) Reference Implementation";
license = licenses.bsd3;
platforms = platforms.all;
};
}