From owner-svn-src-head@freebsd.org Fri Feb 3 08:26:56 2017 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 29BC4CCE02B; Fri, 3 Feb 2017 08:26:56 +0000 (UTC) (envelope-from garga.bsd@gmail.com) Received: from mail-qt0-x241.google.com (mail-qt0-x241.google.com [IPv6:2607:f8b0:400d:c0d::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D7B41847; Fri, 3 Feb 2017 08:26:55 +0000 (UTC) (envelope-from garga.bsd@gmail.com) Received: by mail-qt0-x241.google.com with SMTP id n13so3133903qtc.0; Fri, 03 Feb 2017 00:26:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=D6cxxxfO/7Ovb9R6n/rvYz3KaDEogdGDx9ZxM8NxjAk=; b=lTLSLjK63kVEhKYKIME+adKf4FoL9ZFDEPF//n+KJaijX52GQw6FMap/HBHsLU5lMZ kfgkA0qEael8Rgygl9yDxo2dDfzmHit3PhNG+WBi2XNoDl9n0J35l2wVAgR17B1iObAT /xYEjm0xUGE1XcXGddRmZfSxhoWQvmiY5C0cTKaK2T51KZxF5ISVlND2kIsyHSg2w1Cl f0HJQbjOdHivta/J7Ad4LyC9GA8P6xE4yl4qVW+EVeJDXy1gUpn1iKRH0fxwq3dMVTpj 9Kzip63Pe1PH6QgF/QTK0xauHR9yzs/QqYn4X2enVDLkM3suUT0WWVThSyIfG2rOIVZY Nadw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:mime-version:subject:from:in-reply-to :date:cc:content-transfer-encoding:message-id:references:to; bh=D6cxxxfO/7Ovb9R6n/rvYz3KaDEogdGDx9ZxM8NxjAk=; b=RX1tG8QxgNH1z7DPagYkcgiuQcR+z2Frjwc2FbJa2lRka74IYS6dJeHOTMpqDhTZro EKntf9z+ZB1dKIxydDkHtmIpLylZbV37ODNYe6wWxzlWDNkNjqmEqOQOJhUWtCD+e50Y vasCvEHxEk6bEnujALwqinfalKlrdmDVwRKtuwA5mrQKkL/aCN2kZQWmZiZQjMy7YOzs u4YuszZ0SrRworTxI1f25TRVB8GIllrG1o5h3+wGj3F4e8vRAIShNYPjp/b5bhIlYGLw gYjsn2B0KKmXtBKQSgXpxsJEAywgKaqsp7yS8r3+/Kz48cD4cJ52Ksq/qdBVbx57mGo3 akuw== X-Gm-Message-State: AIkVDXKI06ZSHootOVv2YbA8h7Y+3/gXfOj9rbLowc9eYgUbGd9oH5NAVQkaGNtoLd8GJA== X-Received: by 10.233.237.13 with SMTP id c13mr13232117qkg.227.1486110414997; Fri, 03 Feb 2017 00:26:54 -0800 (PST) Received: from mbp.home ([200.236.247.6]) by smtp.gmail.com with ESMTPSA id l53sm23790052qtl.41.2017.02.03.00.26.52 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 03 Feb 2017 00:26:53 -0800 (PST) Sender: Renato Botelho Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\)) Subject: Re: svn commit: r313048 - in head: contrib/tcpdump contrib/tcpdump/lbl contrib/tcpdump/missing usr.sbin/tcpdump/tcpdump From: Renato Botelho In-Reply-To: <201702012026.v11KQgS3069932@repo.freebsd.org> Date: Fri, 3 Feb 2017 06:26:49 -0200 Cc: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Content-Transfer-Encoding: 7bit Message-Id: References: <201702012026.v11KQgS3069932@repo.freebsd.org> To: Gleb Smirnoff X-Mailer: Apple Mail (2.3259) X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Feb 2017 08:26:56 -0000 > On 1 Feb 2017, at 18:26, Gleb Smirnoff wrote: > > Author: glebius > Date: Wed Feb 1 20:26:42 2017 > New Revision: 313048 > URL: https://svnweb.freebsd.org/changeset/base/313048 > > Log: > Update tcpdump to 4.9.0. > > It fixes many buffer overflow in different protocol parsers, but none of > them are critical, even in absense of Capsicum. > > Security: CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925 > Security: CVE-2016-7926, CVE-2016-7927, CVE-2016-7928, CVE-2016-7929 > Security: CVE-2016-7930, CVE-2016-7931, CVE-2016-7932, CVE-2016-7933 > Security: CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937 > Security: CVE-2016-7938, CVE-2016-7939, CVE-2016-7940, CVE-2016-7973 > Security: CVE-2016-7974, CVE-2016-7975, CVE-2016-7983, CVE-2016-7984 > Security: CVE-2016-7985, CVE-2016-7986, CVE-2016-7992, CVE-2016-7993 > Security: CVE-2016-8574, CVE-2016-8575, CVE-2017-5202, CVE-2017-5203 > Security: CVE-2017-5204, CVE-2017-5205, CVE-2017-5341, CVE-2017-5342 > Security: CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485 > Security: CVE-2017-5486 Hi Gleb, Do you plan to MFC it to stable/11 and stable/10? -- Renato Botelho