|
|
|
--- a/configure
|
|
|
|
+++ b/configure
|
tcpdump: update to version 4.9.0
This fixes the following 41 security problems:
+ CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
+ CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
+ CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
+ CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
+ CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
+ CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
+ CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
+ CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
+ CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
+ CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
+ CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
+ CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
+ CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
+ CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
+ CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
+ CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
+ CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
+ CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
+ CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
+ CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
+ CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
+ CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
+ CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
+ CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
+ CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
+ CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
+ CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
lightweight resolver protocol, PIM).
+ CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
+ CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
+ CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
+ CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
+ CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
+ CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
print-ether.c:ether_print().
+ CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
+ CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
+ CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
+ CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
The size of the package is only incread very little:
new size:
306430 tcpdump_4.9.0-1_mips_24kc.ipk
130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk
old size:
302782 tcpdump_4.8.1-1_mips_24kc.ipk
129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
7 years ago
|
|
|
@@ -5471,37 +5471,6 @@ $as_echo "Using $pfopen" >&6; }
|
|
|
|
LIBS="$LIBS $pfopen"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
- libpcap=FAIL
|
|
|
|
- { $as_echo "$as_me:${as_lineno-$LINENO}: checking for local pcap library" >&5
|
|
|
|
-$as_echo_n "checking for local pcap library... " >&6; }
|
|
|
|
-
|
|
|
|
-# Check whether --with-system-libpcap was given.
|
|
|
|
-if test "${with_system_libpcap+set}" = set; then :
|
|
|
|
- withval=$with_system_libpcap;
|
|
|
|
-fi
|
|
|
|
-
|
|
|
|
- if test "x$with_system_libpcap" != xyes ; then
|
|
|
|
- lastdir=FAIL
|
|
|
|
- places=`ls $srcdir/.. | sed -e 's,/$,,' -e "s,^,$srcdir/../," | \
|
|
|
|
- egrep '/libpcap-[0-9]+\.[0-9]+(\.[0-9]*)?([ab][0-9]*|-PRE-GIT)?$'`
|
|
|
|
- places2=`ls .. | sed -e 's,/$,,' -e "s,^,../," | \
|
|
|
|
- egrep '/libpcap-[0-9]+\.[0-9]+(\.[0-9]*)?([ab][0-9]*|-PRE-GIT)?$'`
|
|
|
|
- for dir in $places $srcdir/../libpcap ../libpcap $srcdir/libpcap $places2 ; do
|
|
|
|
- basedir=`echo $dir | sed -e 's/[ab][0-9]*$//' | \
|
|
|
|
- sed -e 's/-PRE-GIT$//' `
|
|
|
|
- if test $lastdir = $basedir ; then
|
|
|
|
- continue;
|
|
|
|
- fi
|
|
|
|
- lastdir=$dir
|
|
|
|
- if test -r $dir/libpcap.a ; then
|
|
|
|
- libpcap=$dir/libpcap.a
|
|
|
|
- d=$dir
|
|
|
|
- fi
|
|
|
|
- done
|
|
|
|
- fi
|
|
|
|
- if test $libpcap = FAIL ; then
|
|
|
|
- { $as_echo "$as_me:${as_lineno-$LINENO}: result: not found" >&5
|
|
|
|
-$as_echo "not found" >&6; }
|
|
|
|
|
|
|
|
#
|
|
|
|
# Look for pcap-config.
|
tcpdump: update to version 4.9.0
This fixes the following 41 security problems:
+ CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
+ CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
+ CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
+ CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
+ CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
+ CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
+ CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
+ CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
+ CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
+ CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
+ CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
+ CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
+ CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
+ CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
+ CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
+ CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
+ CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
+ CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
+ CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
+ CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
+ CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
+ CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
+ CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
+ CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
+ CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
+ CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
+ CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
lightweight resolver protocol, PIM).
+ CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
+ CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
+ CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
+ CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
+ CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
+ CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
print-ether.c:ether_print().
+ CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
+ CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
+ CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
+ CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
The size of the package is only incread very little:
new size:
306430 tcpdump_4.9.0-1_mips_24kc.ipk
130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk
old size:
302782 tcpdump_4.8.1-1_mips_24kc.ipk
129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
7 years ago
|
|
|
@@ -5657,51 +5626,6 @@ if test "x$ac_cv_lib_pcap_main" = xyes;
|
|
|
|
libpcap="-lpcap"
|
|
|
|
fi
|
|
|
|
|
|
|
|
- if test $libpcap = FAIL ; then
|
|
|
|
- as_fn_error $? "see the INSTALL doc for more info" "$LINENO" 5
|
|
|
|
- fi
|
|
|
|
- { $as_echo "$as_me:${as_lineno-$LINENO}: checking for extraneous pcap header directories" >&5
|
|
|
|
-$as_echo_n "checking for extraneous pcap header directories... " >&6; }
|
|
|
|
- if test \( ! -r /usr/local/include/pcap.h \) -a \
|
|
|
|
- \( ! -r /usr/include/pcap.h \); then
|
|
|
|
- if test -r /usr/local/include/pcap/pcap.h; then
|
|
|
|
- d="/usr/local/include/pcap"
|
|
|
|
- elif test -r /usr/include/pcap/pcap.h; then
|
|
|
|
- d="/usr/include/pcap"
|
|
|
|
- fi
|
|
|
|
- fi
|
|
|
|
- if test -z "$d" ; then
|
|
|
|
- { $as_echo "$as_me:${as_lineno-$LINENO}: result: not found" >&5
|
|
|
|
-$as_echo "not found" >&6; }
|
|
|
|
- else
|
|
|
|
- V_INCLS="-I$d $V_INCLS"
|
|
|
|
- { $as_echo "$as_me:${as_lineno-$LINENO}: result: found -- -I$d added" >&5
|
|
|
|
-$as_echo "found -- -I$d added" >&6; }
|
|
|
|
- fi
|
|
|
|
- fi
|
|
|
|
- else
|
|
|
|
- V_PCAPDEP=$libpcap
|
|
|
|
- places=`ls $srcdir/.. | sed -e 's,/$,,' -e "s,^,$srcdir/../," | \
|
|
|
|
- egrep '/libpcap-[0-9]*.[0-9]*(.[0-9]*)?([ab][0-9]*)?$'`
|
|
|
|
- places2=`ls .. | sed -e 's,/$,,' -e "s,^,../," | \
|
|
|
|
- egrep '/libpcap-[0-9]*.[0-9]*(.[0-9]*)?([ab][0-9]*)?$'`
|
|
|
|
- pcapH=FAIL
|
|
|
|
- if test -r $d/pcap.h; then
|
|
|
|
- pcapH=$d
|
|
|
|
- else
|
|
|
|
- for dir in $places $srcdir/../libpcap ../libpcap $srcdir/libpcap $places2 ; do
|
|
|
|
- if test -r $dir/pcap.h ; then
|
|
|
|
- pcapH=$dir
|
|
|
|
- fi
|
|
|
|
- done
|
|
|
|
- fi
|
|
|
|
-
|
|
|
|
- if test $pcapH = FAIL ; then
|
|
|
|
- as_fn_error $? "cannot find pcap.h: see INSTALL" "$LINENO" 5
|
|
|
|
- fi
|
|
|
|
- V_INCLS="-I$pcapH $V_INCLS"
|
|
|
|
- { $as_echo "$as_me:${as_lineno-$LINENO}: result: $libpcap" >&5
|
|
|
|
-$as_echo "$libpcap" >&6; }
|
|
|
|
# Extract the first word of "pcap-config", so it can be a program name with args.
|
|
|
|
set dummy pcap-config; ac_word=$2
|
|
|
|
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5
|