Date: Mon, 09 Mar 2015 16:38:20 -0400 From: Michael Richardson <mcr@sandelman.ca> To: Michal Sekletar <msekleta@redhat.com>, rfrancoise@debian.org, FreeBSD-security-notifications@FreeBSD.org, security-officer@NetBSD.org Cc: =?utf-8?Q?Fran=C3=A7ois-Xavier?= Le Bail <fx.lebail@yahoo.com>, Guy Harris <guy@alum.mit.edu>, Kevin Day <kevinday@gmail.com>, cve-assign@mitre.org Subject: tcpdump 4.7.2 remote crashes Message-ID: <4820.1425933500@sandelman.ca> In-Reply-To: <51A66E6E-3618-437D-BD6D-B7B04DA65471@gmail.com> References: <EFA9FEC4-A9CF-4420-8D6F-64C38E932D26@gmail.com> <10669.1418399511@sandelman.ca> <9D939A6F-F772-4C10-A9F9-9F90DD6E5905@gmail.com> <17740.1418480904@sandelman.ca> <CAB416B2-A100-4FD3-9C9E-D4DC6EB9A706@gmail.com> <12897.1424029615@sandelman.ca> <51A66E6E-3618-437D-BD6D-B7B04DA65471@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-= Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Hi, please find tcpdump 4.7.2 source code at: http://www.ca.tcpdump.org/beta/tcpdump-4.7.2.tar.gz http://www.ca.tcpdump.org/beta/tcpdump-4.7.2.tar.gz.sig (there is also a matching libpcap) To validate the source code with the "make check" you need to have libpcap-4.7.2 or the geneve test cases will not function. The signature files are made by mcr@sandelman.ca, and will get replaced with tcpdump ones once I get physical access to the key later today. This fixes CVE-2014-9140 --- issue with PPP printer (previously notified) CVE-2015-0261 --- issues with IPv6 mobility printer. CVE-2015-2153 --- issue with tcp printer. CVE-2015-2154 --- issue with ethernet printer. CVE-2015-2155 --- issue with force printer. There are also other issues which related to Capsicum that were already public, as well as DECNET fixes that came in. Our tcpdump 4.7.0 process failed (flailed?) over CVE-2014-9140, and was never properly released. 4.7.1 was internally marked, but not released. A patch for tcpdump 4.3 is at: http://www.ca.tcpdump.org/cve/ 0001-in-some-cases-we-expect-tcpdump-to-fail-with-an-erro.patch 0002-test-case-files-for-CVE-2015-2153-2154-2155.patch 0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch If you require patches for other versions, please let us know. Patch 0001 is needed only so that "make check" will function. (tcpdump 4.3 may not detect libssl properly since ssl churn, so the ESP/IKE test cases will fail since libssl was not detected) Please ACK this email, and let me know when I can let this source code out. =2D-=20 ] Never tell me the odds! | ipv6 mesh network= s [=20 ] Michael Richardson, Sandelman Software Works | network architect= [=20 ] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on rails = [=20 =09 =20=20=20=20 --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEVAwUBVP4EuYCLcPvd0N1lAQJ6UwgAntje7u8aYO82l8hJGhc+oekDabjUtT9e OxDvHkQBjFfaEC+Kg9hdzGuzyV8TwTMpQxWFab1wB5F3DpMkYBLX/rax4OxTnsti 0+EDW2pljpTmTOGGwgQ+Vla8Xo+dyQwjSG0sbcWsZIl6HcXtsDHvnUfpqOAv7i52 Apf8/7axrRwkhjRXgcTXzPa1HN0cYipaaZtZ+hwTbJ8r4dXE1o0zZjVc1vm1nEuw bIe4/odk4RLdJy33ugAjpfN1wYEhCBjDsiYaTTRSL7B2oAHOhTDl1/BbO70B0oEz 4W5fkVvH+Bm8hJtKVNMnKpA3KJTTgnJ2URCOCl2ELF9eaai2X3+T9g== =3OzR -----END PGP SIGNATURE----- --=-=-=--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4820.1425933500>