On Sat, Feb 04, 2017 at 06:41:04PM +0100, Clemens Gruber wrote: > A large number of critical vulnerabilities were fixed in 4.9.0. > Most of them are heap overflows and are remotely exploitable. > > List of CVE numbers: https://www.debian.org/security/2017/dsa-3775 > > Signed-off-by: Clemens Gruber <clemens.gru...@pqgruber.com> > --- > rules/tcpdump.make | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/rules/tcpdump.make b/rules/tcpdump.make > index 9676b1c17..ed5c6d08e 100644 > --- a/rules/tcpdump.make > +++ b/rules/tcpdump.make > @@ -17,8 +17,8 @@ PACKAGES-$(PTXCONF_TCPDUMP) += tcpdump > # > # Paths and names > # > -TCPDUMP_VERSION := 4.8.1
The current version in ptxdist is 4.7.4. I think you have another patch somewhere in your repo. Michael > -TCPDUMP_MD5 := 32f57943649f276e09236ba66622bb0c > +TCPDUMP_VERSION := 4.9.0 > +TCPDUMP_MD5 := 2b83364eef53b63ca3181b4eb56dab0c > TCPDUMP := tcpdump-$(TCPDUMP_VERSION) > TCPDUMP_SUFFIX := tar.gz > TCPDUMP_URL := http://www.tcpdump.org/release/$(TCPDUMP).$(TCPDUMP_SUFFIX) > -- > 2.11.1 > > > _______________________________________________ > ptxdist mailing list > ptxdist@pengutronix.de -- Pengutronix e.K. | | Industrial Linux Solutions | http://www.pengutronix.de/ | Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 | _______________________________________________ ptxdist mailing list ptxdist@pengutronix.de