radsecproxy: update to 1.6.2
authorFlorian Fainelli <florian@openwrt.org>
Thu, 6 Dec 2012 15:47:45 +0000 (15:47 +0000)
committerFlorian Fainelli <florian@openwrt.org>
Thu, 6 Dec 2012 15:47:45 +0000 (15:47 +0000)
Since my previous post a similar issue was discovered for DTLS and 1.6.2
was released. CVE numbers were also assigned for these two
vulnerabilities:

CVE-2012-4523 refers to the TLS issue, fixed in radsecproxy 1.6.1
CVE-2012-4566 refers to the DTLS issue, fixed in radsecproxy 1.6.2

So it would be good to bump to 1.6.2, applying this patch on top of
r34484.

Signed-off-by: Zenon Mousmoulas <zmousm@noc.grnet.gr>
Signed-off-by: Florian Fainelli <florian@openwrt.org>
SVN-Revision: 34535

net/radsecproxy/Makefile

index ee8dbda1e5ab2b620b7d5e0f1f81a89b2080fb6f..da8469199391e6691d329e9e4b723349882eecb0 100644 (file)
@@ -8,12 +8,12 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=radsecproxy
-PKG_VERSION:=1.6.1
-PKG_RELEASE:=2
+PKG_VERSION:=1.6.2
+PKG_RELEASE:=1
 
 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
 PKG_SOURCE_URL:=http://software.uninett.no/radsecproxy/
-PKG_MD5SUM:=841ec9b1492a7c7ae301a05ab035d85d
+PKG_MD5SUM:=dad5c696e4cfe80d606ba90c9a13118b
 
 PKG_INSTALL:=1