Skip to content
Snippets Groups Projects
  1. Mar 19, 2017
  2. Mar 15, 2017
  3. Mar 14, 2017
  4. Mar 13, 2017
  5. Mar 12, 2017
  6. Mar 02, 2017
  7. Feb 28, 2017
  8. Feb 26, 2017
  9. Feb 24, 2017
  10. Feb 15, 2017
  11. Feb 11, 2017
  12. Feb 09, 2017
  13. Feb 06, 2017
    • Hauke Mehrtens's avatar
      tcpdump: update to version 4.9.0 · 985c90d1
      Hauke Mehrtens authored
      
      This fixes the following 41 security problems:
       + CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
       + CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
       + CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
       + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
       + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
       + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
       + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
       + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
       + CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
       + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
       + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
       + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
       + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
       + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
       + CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
       + CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
       + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
       + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
       + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
       + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
       + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
       + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
       + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
       + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
       + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
       + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
       + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
            buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
            lightweight resolver protocol, PIM).
       + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
       + CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
       + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
       + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
       + CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
       + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
            OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
            print-ether.c:ether_print().
       + CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
       + CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
       + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
       + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
      
      The size of the package is only incread very little:
      new size:
      306430 tcpdump_4.9.0-1_mips_24kc.ipk
      130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk
      
      old size:
      302782 tcpdump_4.8.1-1_mips_24kc.ipk
      129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      985c90d1
  14. Feb 01, 2017
  15. Jan 30, 2017
  16. Jan 26, 2017
  17. Jan 16, 2017
  18. Jan 13, 2017
  19. Jan 11, 2017
  20. Jan 10, 2017
  21. Jan 05, 2017
  22. Jan 03, 2017
  23. Jan 02, 2017
    • Hauke Mehrtens's avatar
      curl: update to version 7.52.1 · 1436e154
      Hauke Mehrtens authored
      
      This fixes the folowing security problems:
      
      CVE-2016-9586: printf floating point buffer overflow
      CVE-2016-9952: Win CE schannel cert wildcard matches too much
      CVE-2016-9953: Win CE schannel cert name out of buffer read
      CVE-2016-9594: unititialized random
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      1436e154
  24. Dec 22, 2016
  25. Dec 20, 2016
  26. Dec 16, 2016
  27. Dec 14, 2016
    • Matti Laakso's avatar
      comgt-ncm: Add support for specifying profile index · 5bd3b9df
      Matti Laakso authored
      
      Add support for specifying a call profile index instead of APN. A
      specific index different from 1 must be used for some service
      provider and modem combinations.
      
      In addition, change the manufacturer detection to use the standard
      AT+CGMI command, which produces more predictable output than ATI,
      remove the redundant ipv6 option, since it is less ambiguous to
      directly specify the PDP context type with mobile connections, and
      fix missing device during teardown when using ncm through the wwan
      proto.
      
      Signed-off-by: default avatarMatti Laakso <malaakso@elisanet.fi>
      5bd3b9df
    • Matti Laakso's avatar
      uqmi: Add support for specifying profile index · 2e2748b0
      Matti Laakso authored
      
      Update uqmi to latest version, which brings about support for
      specifying a call profile index instead of APN. A specific index
      different from 1 must be used for some service provider and modem
      combinations.
      
      Also change option dhcp to dhcpv6, since IPv4 now always uses DHCP,
      replace option ipv6 with pdptype, which is less ambiguous, and
      make autoconnect optional and default it to off for IPv6 due to it
      not working with statically configured IPv6.
      
      Signed-off-by: default avatarMatti Laakso <malaakso@elisanet.fi>
      2e2748b0
    • Jo-Philipp Wich's avatar
      netfilter: drop proprietary xt_id match · e2f8d200
      Jo-Philipp Wich authored
      
      The xt_id match was used by the firewall3 package to track its own rules but
      the approach has been changed to use xt_comment instead now, so we can drop
      this nonstandard extension.
      
      Signed-off-by: default avatarJo-Philipp Wich <jo@mein.io>
      e2f8d200
Loading