On Tue, Feb 07, 2017 at 06:02:34PM +0100, Clemens Gruber wrote: > A large number of critical vulnerabilities were fixed in 4.9.0. > Most of them are heap overflows and are remotely exploitable. > > List of CVE numbers: https://www.debian.org/security/2017/dsa-3775 > > Signed-off-by: Clemens Gruber <clemens.gru...@pqgruber.com>
Thanks, applied, Michael > --- > rules/tcpdump.make | 5 ++--- > 1 file changed, 2 insertions(+), 3 deletions(-) > > diff --git a/rules/tcpdump.make b/rules/tcpdump.make > index afdbc3146..ed5c6d08e 100644 > --- a/rules/tcpdump.make > +++ b/rules/tcpdump.make > @@ -17,8 +17,8 @@ PACKAGES-$(PTXCONF_TCPDUMP) += tcpdump > # > # Paths and names > # > -TCPDUMP_VERSION := 4.7.4 > -TCPDUMP_MD5 := 58af728de36f499341918fc4b8e827c3 > +TCPDUMP_VERSION := 4.9.0 > +TCPDUMP_MD5 := 2b83364eef53b63ca3181b4eb56dab0c > TCPDUMP := tcpdump-$(TCPDUMP_VERSION) > TCPDUMP_SUFFIX := tar.gz > TCPDUMP_URL := http://www.tcpdump.org/release/$(TCPDUMP).$(TCPDUMP_SUFFIX) > @@ -42,7 +42,6 @@ TCPDUMP_CONF_TOOL := autoconf > TCPDUMP_CONF_OPT := \ > $(CROSS_AUTOCONF_USR) \ > --$(call ptx/endis,PTXCONF_TCPDUMP_SMB)-smb \ > - $(GLOBAL_IPV6_OPTION) \ > --without-smi \ > --with-system-libpcap \ > --$(call ptx/wwo,PTXCONF_TCPDUMP_ENABLE_CRYPTO)-crypto \ > -- > 2.11.1 > > > _______________________________________________ > ptxdist mailing list > ptxdist@pengutronix.de -- Pengutronix e.K. | | Industrial Linux Solutions | http://www.pengutronix.de/ | Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 | _______________________________________________ ptxdist mailing list ptxdist@pengutronix.de