gnu: tcpdump: Update to 4.9.0 [security fixes].
Fixes CVE-2016-{7922,7923,7924,7925,7926,7927,7928,7929,7930,7931,7932,7933 7934,7935,7936,7937,7938,7939,7940,7973,7974,7975,7983,7984,7985,7986,7992,7993, 8574,8575} and CVE-2017-{5202,5203,5204,5205,5341,5342,5482,5483,5484,5485, 5486}. * gnu/packages/admin.scm (tcpdump): Update to 4.9.0. [source]: Add alternate URL and set the file-name.
This commit is contained in:
parent
df4a2b44d3
commit
af7d72b16c
|
@ -633,14 +633,24 @@ network statistics collection, security monitoring, network debugging, etc.")
|
||||||
(define-public tcpdump
|
(define-public tcpdump
|
||||||
(package
|
(package
|
||||||
(name "tcpdump")
|
(name "tcpdump")
|
||||||
(version "4.7.4")
|
(version "4.9.0")
|
||||||
(source (origin
|
(source (origin
|
||||||
(method url-fetch)
|
(method url-fetch)
|
||||||
(uri (string-append "http://www.tcpdump.org/release/tcpdump-"
|
;; We use this Debian URL while the upstream URL is still
|
||||||
version ".tar.gz"))
|
;; officially private. This is the result of a botched
|
||||||
|
;; coordinated release of tcpdump 4.9.0. I verified with
|
||||||
|
;; the tcpdump maintainers that the upstream URL provides
|
||||||
|
;; the same data as this Debian URL.
|
||||||
|
(uri
|
||||||
|
(list
|
||||||
|
(string-append "http://http.debian.net/debian/pool/main/t/"
|
||||||
|
name "/" name "_" version ".orig.tar.gz")
|
||||||
|
(string-append "http://www.tcpdump.org/release/tcpdump-"
|
||||||
|
version ".tar.gz")))
|
||||||
|
(file-name (string-append name "-" version ".tar.gz"))
|
||||||
(sha256
|
(sha256
|
||||||
(base32
|
(base32
|
||||||
"1byr8w6grk08fsq0444jmcz9ar89lq9nf4mjq2cny0w9k8k21rbb"))))
|
"0pjsxsy8l71i813sa934cwf1ryp9xbr7nxwsvnzavjdirchq3sga"))))
|
||||||
(build-system gnu-build-system)
|
(build-system gnu-build-system)
|
||||||
(inputs `(("libpcap" ,libpcap)
|
(inputs `(("libpcap" ,libpcap)
|
||||||
("openssl" ,openssl)))
|
("openssl" ,openssl)))
|
||||||
|
|
Loading…
Reference in New Issue