~ruther/guix-local

af7d72b16c7652e9ddc3c441017de5c9bb9205f2 — Leo Famulari 9 years ago df4a2b4
gnu: tcpdump: Update to 4.9.0 [security fixes].

Fixes CVE-2016-{7922,7923,7924,7925,7926,7927,7928,7929,7930,7931,7932,7933
7934,7935,7936,7937,7938,7939,7940,7973,7974,7975,7983,7984,7985,7986,7992,7993,
8574,8575} and CVE-2017-{5202,5203,5204,5205,5341,5342,5482,5483,5484,5485,
5486}.

* gnu/packages/admin.scm (tcpdump): Update to 4.9.0.
[source]: Add alternate URL and set the file-name.
1 files changed, 14 insertions(+), 4 deletions(-)

M gnu/packages/admin.scm
M gnu/packages/admin.scm => gnu/packages/admin.scm +14 -4
@@ 633,14 633,24 @@ network statistics collection, security monitoring, network debugging, etc.")
(define-public tcpdump
  (package
    (name "tcpdump")
    (version "4.7.4")
    (version "4.9.0")
    (source (origin
              (method url-fetch)
              (uri (string-append "http://www.tcpdump.org/release/tcpdump-"
                                  version ".tar.gz"))
              ;; We use this Debian URL while the upstream URL is still
              ;; officially private. This is the result of a botched
              ;; coordinated release of tcpdump 4.9.0. I verified with
              ;; the tcpdump maintainers that the upstream URL provides
              ;; the same data as this Debian URL.
              (uri
                (list
                  (string-append "http://http.debian.net/debian/pool/main/t/"
                                  name "/" name "_" version ".orig.tar.gz")
                  (string-append "http://www.tcpdump.org/release/tcpdump-"
                                 version ".tar.gz")))
              (file-name (string-append name "-" version ".tar.gz"))
              (sha256
               (base32
                "1byr8w6grk08fsq0444jmcz9ar89lq9nf4mjq2cny0w9k8k21rbb"))))
                "0pjsxsy8l71i813sa934cwf1ryp9xbr7nxwsvnzavjdirchq3sga"))))
    (build-system gnu-build-system)
    (inputs `(("libpcap" ,libpcap)
              ("openssl" ,openssl)))