From e73c3a92e025a8cbadfb0c60facb869f5a0adbfe Mon Sep 17 00:00:00 2001 From: florian Date: Thu, 6 Dec 2012 15:47:45 +0000 Subject: [PATCH] radsecproxy: update to 1.6.2 Since my previous post a similar issue was discovered for DTLS and 1.6.2 was released. CVE numbers were also assigned for these two vulnerabilities: CVE-2012-4523 refers to the TLS issue, fixed in radsecproxy 1.6.1 CVE-2012-4566 refers to the DTLS issue, fixed in radsecproxy 1.6.2 So it would be good to bump to 1.6.2, applying this patch on top of r34484. Signed-off-by: Zenon Mousmoulas Signed-off-by: Florian Fainelli git-svn-id: svn://svn.openwrt.org/openwrt/packages@34535 3c298f89-4303-0410-b956-a3cf2f4a3e73 --- net/radsecproxy/Makefile | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/net/radsecproxy/Makefile b/net/radsecproxy/Makefile index ee8dbda1e..da8469199 100644 --- a/net/radsecproxy/Makefile +++ b/net/radsecproxy/Makefile @@ -8,12 +8,12 @@ include $(TOPDIR)/rules.mk PKG_NAME:=radsecproxy -PKG_VERSION:=1.6.1 -PKG_RELEASE:=2 +PKG_VERSION:=1.6.2 +PKG_RELEASE:=1 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz PKG_SOURCE_URL:=http://software.uninett.no/radsecproxy/ -PKG_MD5SUM:=841ec9b1492a7c7ae301a05ab035d85d +PKG_MD5SUM:=dad5c696e4cfe80d606ba90c9a13118b PKG_INSTALL:=1 -- 2.11.0