Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 09 Mar 2015 16:38:20 -0400
From:      Michael Richardson <mcr@sandelman.ca>
To:        Michal Sekletar <msekleta@redhat.com>, rfrancoise@debian.org, FreeBSD-security-notifications@FreeBSD.org, security-officer@NetBSD.org
Cc:        =?utf-8?Q?Fran=C3=A7ois-Xavier?= Le Bail <fx.lebail@yahoo.com>, Guy Harris <guy@alum.mit.edu>, Kevin Day <kevinday@gmail.com>, cve-assign@mitre.org
Subject:   tcpdump 4.7.2 remote crashes
Message-ID:  <4820.1425933500@sandelman.ca>
In-Reply-To: <51A66E6E-3618-437D-BD6D-B7B04DA65471@gmail.com>
References:  <EFA9FEC4-A9CF-4420-8D6F-64C38E932D26@gmail.com> <10669.1418399511@sandelman.ca> <9D939A6F-F772-4C10-A9F9-9F90DD6E5905@gmail.com> <17740.1418480904@sandelman.ca> <CAB416B2-A100-4FD3-9C9E-D4DC6EB9A706@gmail.com> <12897.1424029615@sandelman.ca> <51A66E6E-3618-437D-BD6D-B7B04DA65471@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


Hi, please find tcpdump 4.7.2 source code at:
    http://www.ca.tcpdump.org/beta/tcpdump-4.7.2.tar.gz
    http://www.ca.tcpdump.org/beta/tcpdump-4.7.2.tar.gz.sig
    (there is also a matching libpcap)

To validate the source code with the "make check" you need to have
libpcap-4.7.2 or the geneve test cases will not function.
The signature files are made by mcr@sandelman.ca, and will get replaced
with tcpdump ones once I get physical access to the key later today.

This fixes CVE-2014-9140 --- issue with PPP printer (previously notified)
           CVE-2015-0261 --- issues with IPv6 mobility printer.
           CVE-2015-2153 --- issue with tcp printer.
           CVE-2015-2154 --- issue with ethernet printer.
           CVE-2015-2155 --- issue with force printer.

There are also other issues which related to Capsicum that were
already public, as well as DECNET fixes that came in.
Our tcpdump 4.7.0 process failed (flailed?) over CVE-2014-9140,
and was never properly released.  4.7.1 was internally marked, but not
released.

A patch for tcpdump 4.3 is at:
    http://www.ca.tcpdump.org/cve/

0001-in-some-cases-we-expect-tcpdump-to-fail-with-an-erro.patch
0002-test-case-files-for-CVE-2015-2153-2154-2155.patch
0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch

If you require patches for other versions, please let us know.

Patch 0001 is needed only so that "make check" will function.
(tcpdump 4.3 may not detect libssl properly since ssl churn, so the ESP/IKE
test cases will fail since libssl was not detected)

Please ACK this email, and let me know when I can let this source code out.

=2D-=20
]               Never tell me the odds!                 | ipv6 mesh network=
s [=20
]   Michael Richardson, Sandelman Software Works        | network architect=
  [=20
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails  =
  [=20
=09



=20=20=20=20

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEVAwUBVP4EuYCLcPvd0N1lAQJ6UwgAntje7u8aYO82l8hJGhc+oekDabjUtT9e
OxDvHkQBjFfaEC+Kg9hdzGuzyV8TwTMpQxWFab1wB5F3DpMkYBLX/rax4OxTnsti
0+EDW2pljpTmTOGGwgQ+Vla8Xo+dyQwjSG0sbcWsZIl6HcXtsDHvnUfpqOAv7i52
Apf8/7axrRwkhjRXgcTXzPa1HN0cYipaaZtZ+hwTbJ8r4dXE1o0zZjVc1vm1nEuw
bIe4/odk4RLdJy33ugAjpfN1wYEhCBjDsiYaTTRSL7B2oAHOhTDl1/BbO70B0oEz
4W5fkVvH+Bm8hJtKVNMnKpA3KJTTgnJ2URCOCl2ELF9eaai2X3+T9g==
=3OzR
-----END PGP SIGNATURE-----
--=-=-=--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4820.1425933500>