On Sat, Feb 04, 2017 at 06:41:04PM +0100, Clemens Gruber wrote:
> A large number of critical vulnerabilities were fixed in 4.9.0.
> Most of them are heap overflows and are remotely exploitable.
> 
> List of CVE numbers: https://www.debian.org/security/2017/dsa-3775
> 
> Signed-off-by: Clemens Gruber <clemens.gru...@pqgruber.com>
> ---
>  rules/tcpdump.make | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/rules/tcpdump.make b/rules/tcpdump.make
> index 9676b1c17..ed5c6d08e 100644
> --- a/rules/tcpdump.make
> +++ b/rules/tcpdump.make
> @@ -17,8 +17,8 @@ PACKAGES-$(PTXCONF_TCPDUMP) += tcpdump
>  #
>  # Paths and names
>  #
> -TCPDUMP_VERSION      := 4.8.1

The current version in ptxdist is 4.7.4. I think you have another patch
somewhere in your repo.

Michael

> -TCPDUMP_MD5  := 32f57943649f276e09236ba66622bb0c
> +TCPDUMP_VERSION      := 4.9.0
> +TCPDUMP_MD5  := 2b83364eef53b63ca3181b4eb56dab0c
>  TCPDUMP              := tcpdump-$(TCPDUMP_VERSION)
>  TCPDUMP_SUFFIX       := tar.gz
>  TCPDUMP_URL  := http://www.tcpdump.org/release/$(TCPDUMP).$(TCPDUMP_SUFFIX)
> -- 
> 2.11.1
> 
> 
> _______________________________________________
> ptxdist mailing list
> ptxdist@pengutronix.de

-- 
Pengutronix e.K.                           |                             |
Industrial Linux Solutions                 | http://www.pengutronix.de/  |
Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0    |
Amtsgericht Hildesheim, HRA 2686           | Fax:   +49-5121-206917-5555 |

_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de

Reply via email to