radsecproxy: update to 1.6.2
Since my previous post a similar issue was discovered for DTLS and 1.6.2 was released. CVE numbers were also assigned for these two vulnerabilities: CVE-2012-4523 refers to the TLS issue, fixed in radsecproxy 1.6.1 CVE-2012-4566 refers to the DTLS issue, fixed in radsecproxy 1.6.2 So it would be good to bump to 1.6.2, applying this patch on top of r34484. Signed-off-by: Zenon Mousmoulas <zmousm@noc.grnet.gr> Signed-off-by: Florian Fainelli <florian@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/packages@34535 3c298f89-4303-0410-b956-a3cf2f4a3e73
This commit is contained in:
parent
3933dd1d4f
commit
e73c3a92e0
@ -8,12 +8,12 @@
|
||||
include $(TOPDIR)/rules.mk
|
||||
|
||||
PKG_NAME:=radsecproxy
|
||||
PKG_VERSION:=1.6.1
|
||||
PKG_RELEASE:=2
|
||||
PKG_VERSION:=1.6.2
|
||||
PKG_RELEASE:=1
|
||||
|
||||
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
|
||||
PKG_SOURCE_URL:=http://software.uninett.no/radsecproxy/
|
||||
PKG_MD5SUM:=841ec9b1492a7c7ae301a05ab035d85d
|
||||
PKG_MD5SUM:=dad5c696e4cfe80d606ba90c9a13118b
|
||||
|
||||
PKG_INSTALL:=1
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user