00eb2a0a90
Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue. https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6171eb07-d8a9-11e5-b2bd-002590263bf5
36 lines
807 B
Nix
36 lines
807 B
Nix
{ stdenv, fetchFromGitHub, pkgconfig
|
|
, openssl ? null, libpcap ? null
|
|
}:
|
|
|
|
with stdenv.lib;
|
|
stdenv.mkDerivation rec {
|
|
name = "libsrtp-${version}";
|
|
version = "1.5.4";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "cisco";
|
|
repo = "libsrtp";
|
|
rev = "v${version}";
|
|
sha256 = "0s029m4iw0nsvnsm2hlz8yajrasdvf315iv2dw8mfm7nhbshwsqa";
|
|
};
|
|
|
|
buildInputs = [ pkgconfig ];
|
|
|
|
# libsrtp.pc references -lcrypto -lpcap without -L
|
|
propagatedBuildInputs = [ openssl libpcap ];
|
|
|
|
configureFlags = [
|
|
"--disable-debug"
|
|
] ++ optional (openssl != null) "--enable-openssl";
|
|
|
|
postInstall = ''
|
|
rm -rf $out/bin
|
|
'';
|
|
|
|
meta = {
|
|
homepage = https://github.com/cisco/libsrtp;
|
|
description = "Secure RTP (SRTP) Reference Implementation";
|
|
license = licenses.bsd3;
|
|
platforms = platforms.all;
|
|
};
|
|
}
|