From patchwork Sat Oct 5 07:05:25 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthias Fischer X-Patchwork-Id: 2471 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 46ld760mHNz3yYP for ; Sat, 5 Oct 2019 07:05:38 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail02.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 46ld750QCvz2GR; Sat, 5 Oct 2019 07:05:37 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 46ld745vnsz2yRX; Sat, 5 Oct 2019 07:05:36 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 46ld730n51z2yBF for ; Sat, 5 Oct 2019 07:05:35 +0000 (UTC) Received: from Devel.localdomain (p4FF56DD1.dip0.t-ipconnect.de [79.245.109.209]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 46ld723PG3z2GR for ; Sat, 5 Oct 2019 07:05:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201909rsa; t=1570259134; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc; bh=BTbtKx3Pi5AFhe83zoCipwz4JSW8k11I2YXvqZp+XK4=; b=Oe6pNjegTVfqf0xT59I2vWPVn3QktcCnn5v4uhla0XteLlkZyn7A3u2dsH8BhEVydbXQk0 2V3+Foe//RncbESnkUeR29lHcUlYfvdHi8j1sLpySF+yEh5Xjq57WturJisZAThE8OvXh3 RbybgiTC7as/G0wY+lEQ4HtSAKRFH/tSY0HJvnJoXbNIvsey9erfu77rSXuWwlViaYQaEL z1hL+HC1vge3T0M+6BNq8Ss1r/ImzpDJPpNMiC8yW8PwVl/bTaqmyPF6xrtUmFcZljfXjq d5OWdqNi4/nloQT94iS+ck/S3ySVaymU+PVfJH/UyOfELNDDM3rn0LDe2C2hdg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=201909ed25519; t=1570259134; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc; bh=BTbtKx3Pi5AFhe83zoCipwz4JSW8k11I2YXvqZp+XK4=; b=L771YdBAjjl2sjW1ZUBH0Ip+N0QuTz+N0Kgi2qjj37S8nX0SDnUQGk4qxPmkh6cc2Vh060 B0DvIiLWaIxijbBQ== From: Matthias Fischer To: development@lists.ipfire.org Subject: [PATCH] tcpdump: Update to 4.9.3 Date: Sat, 5 Oct 2019 09:05:25 +0200 Message-Id: <20191005070525.3325-1-matthias.fischer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=mfischer smtp.mailfrom=matthias.fischer@ipfire.org X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" For details see: https://www.tcpdump.org/tcpdump-changes.txt "Fix buffer overflow/overread vulnerabilities: CVE-2017-16808 (AoE) CVE-2018-14468 (FrameRelay) CVE-2018-14469 (IKEv1) CVE-2018-14470 (BABEL) CVE-2018-14466 (AFS/RX) CVE-2018-14461 (LDP) CVE-2018-14462 (ICMP) CVE-2018-14465 (RSVP) CVE-2018-14881 (BGP) CVE-2018-14464 (LMP) CVE-2018-14463 (VRRP) CVE-2018-14467 (BGP) CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) CVE-2018-14880 (OSPF6) CVE-2018-16451 (SMB) CVE-2018-14882 (RPL) CVE-2018-16227 (802.11) CVE-2018-16229 (DCCP) CVE-2018-16301 (was fixed in libpcap) CVE-2018-16230 (BGP) CVE-2018-16452 (SMB) CVE-2018-16300 (BGP) CVE-2018-16228 (HNCP) CVE-2019-15166 (LMP) CVE-2019-15167 (VRRP) Fix for cmdline argument/local issues: CVE-2018-14879 (tcpdump -V)" Signed-off-by: Matthias Fischer --- lfs/tcpdump | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lfs/tcpdump b/lfs/tcpdump index a53cae06f..b22a1a043 100644 --- a/lfs/tcpdump +++ b/lfs/tcpdump @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2018 IPFire Team # +# Copyright (C) 2007-2019 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -24,7 +24,7 @@ include Config -VER = 4.9.2 +VER = 4.9.3 THISAPP = tcpdump-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -32,7 +32,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = tcpdump -PAK_VER = 10 +PAK_VER = 11 DEPS = "" @@ -44,7 +44,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = 9bbc1ee33dab61302411b02dd0515576 +$(DL_FILE)_MD5 = a4ead41d371f91aa0a2287f589958bae install : $(TARGET)