Skip to content
Snippets Groups Projects
  1. Feb 09, 2017
  2. Feb 06, 2017
    • Hauke Mehrtens's avatar
      tcpdump: update to version 4.9.0 · 985c90d1
      Hauke Mehrtens authored
      
      This fixes the following 41 security problems:
       + CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
       + CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
       + CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
       + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
       + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
       + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
       + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
       + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
       + CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
       + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
       + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
       + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
       + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
       + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
       + CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
       + CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
       + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
       + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
       + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
       + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
       + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
       + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
       + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
       + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
       + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
       + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
       + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
            buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
            lightweight resolver protocol, PIM).
       + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
       + CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
       + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
       + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
       + CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
       + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
            OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
            print-ether.c:ether_print().
       + CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
       + CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
       + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
       + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
      
      The size of the package is only incread very little:
      new size:
      306430 tcpdump_4.9.0-1_mips_24kc.ipk
      130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk
      
      old size:
      302782 tcpdump_4.8.1-1_mips_24kc.ipk
      129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      985c90d1
  3. Feb 01, 2017
  4. Jan 30, 2017
  5. Jan 26, 2017
  6. Jan 16, 2017
  7. Jan 13, 2017
  8. Jan 11, 2017
  9. Jan 10, 2017
  10. Jan 05, 2017
  11. Jan 03, 2017
  12. Jan 02, 2017
    • Hauke Mehrtens's avatar
      curl: update to version 7.52.1 · 1436e154
      Hauke Mehrtens authored
      
      This fixes the folowing security problems:
      
      CVE-2016-9586: printf floating point buffer overflow
      CVE-2016-9952: Win CE schannel cert wildcard matches too much
      CVE-2016-9953: Win CE schannel cert name out of buffer read
      CVE-2016-9594: unititialized random
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      1436e154
  13. Dec 22, 2016
  14. Dec 20, 2016
  15. Dec 16, 2016
  16. Dec 14, 2016
    • Matti Laakso's avatar
      comgt-ncm: Add support for specifying profile index · 5bd3b9df
      Matti Laakso authored
      
      Add support for specifying a call profile index instead of APN. A
      specific index different from 1 must be used for some service
      provider and modem combinations.
      
      In addition, change the manufacturer detection to use the standard
      AT+CGMI command, which produces more predictable output than ATI,
      remove the redundant ipv6 option, since it is less ambiguous to
      directly specify the PDP context type with mobile connections, and
      fix missing device during teardown when using ncm through the wwan
      proto.
      
      Signed-off-by: default avatarMatti Laakso <malaakso@elisanet.fi>
      5bd3b9df
    • Matti Laakso's avatar
      uqmi: Add support for specifying profile index · 2e2748b0
      Matti Laakso authored
      
      Update uqmi to latest version, which brings about support for
      specifying a call profile index instead of APN. A specific index
      different from 1 must be used for some service provider and modem
      combinations.
      
      Also change option dhcp to dhcpv6, since IPv4 now always uses DHCP,
      replace option ipv6 with pdptype, which is less ambiguous, and
      make autoconnect optional and default it to off for IPv6 due to it
      not working with statically configured IPv6.
      
      Signed-off-by: default avatarMatti Laakso <malaakso@elisanet.fi>
      2e2748b0
    • Jo-Philipp Wich's avatar
      netfilter: drop proprietary xt_id match · e2f8d200
      Jo-Philipp Wich authored
      
      The xt_id match was used by the firewall3 package to track its own rules but
      the approach has been changed to use xt_comment instead now, so we can drop
      this nonstandard extension.
      
      Signed-off-by: default avatarJo-Philipp Wich <jo@mein.io>
      e2f8d200
  17. Dec 12, 2016
  18. Dec 03, 2016
    • Hauke Mehrtens's avatar
      curl: update to version 7.51.0 · 4e07167e
      Hauke Mehrtens authored
      
      This fixes the following security problems:
      CVE-2016-8615: cookie injection for other servers
      CVE-2016-8616: case insensitive password comparison
      CVE-2016-8617: OOB write via unchecked multiplication
      CVE-2016-8618: double-free in curl_maprintf
      CVE-2016-8619: double-free in krb5 code
      CVE-2016-8620: glob parser write/read out of bounds
      CVE-2016-8621: curl_getdate read out of bounds
      CVE-2016-8622: URL unescape heap overflow via integer truncation
      CVE-2016-8623: Use-after-free via shared cookies
      CVE-2016-8624: invalid URL parsing with '#'
      CVE-2016-8625: IDNA 2003 makes curl use wrong host
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      4e07167e
  19. Dec 01, 2016
  20. Nov 29, 2016
  21. Nov 26, 2016
  22. Nov 14, 2016
  23. Nov 12, 2016
Loading