quagga: security bump to version 1.1.1
Fixes CVE-2017-5495: Telnet interface input buffer allocates unbounded amounts of memory, leading to DoS. Add optional dependency on protobuf-c. Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
010629702a
commit
ae73226476
@ -1,2 +1,2 @@
|
||||
# Locally calculated after checking pgp signature
|
||||
sha256 d284af5dd875dbba90ab875d40db5d68fdc9ede17a76f2af525f85344be56767 quagga-1.0.20160315.tar.xz
|
||||
sha256 b5a94e5bdad3062e04595a5692b8cc435f0a85102f75dfdca0a06d093b4ef63f quagga-1.1.1.tar.gz
|
||||
|
@ -4,10 +4,9 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
QUAGGA_VERSION = 1.0.20160315
|
||||
QUAGGA_SOURCE = quagga-$(QUAGGA_VERSION).tar.xz
|
||||
QUAGGA_VERSION = 1.1.1
|
||||
QUAGGA_SITE = http://download.savannah.gnu.org/releases/quagga
|
||||
QUAGGA_DEPENDENCIES = host-gawk
|
||||
QUAGGA_DEPENDENCIES = host-gawk host-pkgconf
|
||||
QUAGGA_LICENSE = GPLv2+
|
||||
QUAGGA_LICENSE_FILES = COPYING
|
||||
|
||||
@ -29,6 +28,13 @@ else
|
||||
QUAGGA_CONF_OPTS += --disable-capabilities
|
||||
endif
|
||||
|
||||
ifeq ($(BR2_PACKAGE_PROTOBUF_C),y)
|
||||
QUAGGA_CONF_OPTS += --enable-protobuf
|
||||
QUAGGA_DEPENDENCIES += protobuf-c
|
||||
else
|
||||
QUAGGA_CONF_OPTS += --disable-protobuf
|
||||
endif
|
||||
|
||||
QUAGGA_CONF_OPTS += $(if $(BR2_PACKAGE_QUAGGA_ZEBRA),--enable-zebra,--disable-zebra)
|
||||
QUAGGA_CONF_OPTS += $(if $(BR2_PACKAGE_QUAGGA_BGPD),--enable-bgpd,--disable-bgpd)
|
||||
QUAGGA_CONF_OPTS += $(if $(BR2_PACKAGE_QUAGGA_RIPD),--enable-ripd,--disable-ripd)
|
||||
|
Loading…
Reference in New Issue
Block a user