On Tue, Feb 07, 2017 at 06:02:34PM +0100, Clemens Gruber wrote:
> A large number of critical vulnerabilities were fixed in 4.9.0.
> Most of them are heap overflows and are remotely exploitable.
> 
> List of CVE numbers: https://www.debian.org/security/2017/dsa-3775
> 
> Signed-off-by: Clemens Gruber <clemens.gru...@pqgruber.com>

Thanks, applied,

Michael

> ---
>  rules/tcpdump.make | 5 ++---
>  1 file changed, 2 insertions(+), 3 deletions(-)
> 
> diff --git a/rules/tcpdump.make b/rules/tcpdump.make
> index afdbc3146..ed5c6d08e 100644
> --- a/rules/tcpdump.make
> +++ b/rules/tcpdump.make
> @@ -17,8 +17,8 @@ PACKAGES-$(PTXCONF_TCPDUMP) += tcpdump
>  #
>  # Paths and names
>  #
> -TCPDUMP_VERSION      := 4.7.4
> -TCPDUMP_MD5  := 58af728de36f499341918fc4b8e827c3
> +TCPDUMP_VERSION      := 4.9.0
> +TCPDUMP_MD5  := 2b83364eef53b63ca3181b4eb56dab0c
>  TCPDUMP              := tcpdump-$(TCPDUMP_VERSION)
>  TCPDUMP_SUFFIX       := tar.gz
>  TCPDUMP_URL  := http://www.tcpdump.org/release/$(TCPDUMP).$(TCPDUMP_SUFFIX)
> @@ -42,7 +42,6 @@ TCPDUMP_CONF_TOOL   := autoconf
>  TCPDUMP_CONF_OPT     := \
>       $(CROSS_AUTOCONF_USR) \
>       --$(call ptx/endis,PTXCONF_TCPDUMP_SMB)-smb \
> -     $(GLOBAL_IPV6_OPTION) \
>       --without-smi \
>       --with-system-libpcap \
>       --$(call ptx/wwo,PTXCONF_TCPDUMP_ENABLE_CRYPTO)-crypto \
> -- 
> 2.11.1
> 
> 
> _______________________________________________
> ptxdist mailing list
> ptxdist@pengutronix.de

-- 
Pengutronix e.K.                           |                             |
Industrial Linux Solutions                 | http://www.pengutronix.de/  |
Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0    |
Amtsgericht Hildesheim, HRA 2686           | Fax:   +49-5121-206917-5555 |

_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de

Reply via email to