Your message dated Wed, 01 Aug 2007 18:17:04 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#434030: fixed in tcpdump 3.9.5-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: tcpdump
Version: 3.9.5-2
Severity: important
Tags: security patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Seems there is a vulnerability in print-bgp.c. There is an explloit
available at http://www.digit-labs.org/files/exploits/tcpdump-bgp.c. A
patch is available too:
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12.
Please check yourself.

Regards, Daniel


- -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (850, 'unstable'), (700, 'testing'), (550, 'stable'), (110, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21.5 (PREEMPT)
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages tcpdump depends on:
ii  libc6                         2.6-2      GNU C Library: Shared libraries
ii  libpcap0.8                    0.9.5-1    System interface for user-level pa
ii  libssl0.9.8                   0.9.8e-5   SSL shared libraries

tcpdump recommends no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGoWUpm0bx+wiPa4wRAvJOAJ9sqc9omFvk98FmLtdZyvpq4eNh+ACfXR7k
W5APXC88dEUlhabRF4oz0HA=
=Gl/S
-----END PGP SIGNATURE-----


--- End Message ---
--- Begin Message ---
Source: tcpdump
Source-Version: 3.9.5-3

We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive:

tcpdump_3.9.5-3.diff.gz
  to pool/main/t/tcpdump/tcpdump_3.9.5-3.diff.gz
tcpdump_3.9.5-3.dsc
  to pool/main/t/tcpdump/tcpdump_3.9.5-3.dsc
tcpdump_3.9.5-3_amd64.deb
  to pool/main/t/tcpdump/tcpdump_3.9.5-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Francoise <[EMAIL PROTECTED]> (supplier of updated tcpdump package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 01 Aug 2007 19:56:04 +0200
Source: tcpdump
Binary: tcpdump
Architecture: source amd64
Version: 3.9.5-3
Distribution: unstable
Urgency: medium
Maintainer: Romain Francoise <[EMAIL PROTECTED]>
Changed-By: Romain Francoise <[EMAIL PROTECTED]>
Description: 
 tcpdump    - A powerful tool for network monitoring and data acquisition
Closes: 434030
Changes: 
 tcpdump (3.9.5-3) unstable; urgency=medium
 .
   * Convert to quilt for patch management:
     + debian/control: Build-Depend on quilt (>= 0.40) instead of dpatch.
     + debian/rules: Include /usr/share/quilt/quilt.make.
     + Convert all dpatch patches to regular patches.
 .
   * debian/patches/41_cve-2007-3798.diff: New patch, fixes an integer
     overflow in the BGP dissector (CVE-2007-3798), thanks to Daniel Leidert
     (closes: #434030).
   * debian/patches/series: Update.
Files: 
 676d4777f8bb5f976633b1884655c8e9 623 net optional tcpdump_3.9.5-3.dsc
 3b9189bc4c88d07fa47c38806dfd4dcf 11327 net optional tcpdump_3.9.5-3.diff.gz
 bdbfaa2293f42aa439832bddb162c73a 315998 net optional tcpdump_3.9.5-3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGsMutogN2vsA8Vt8RAo2eAKCA35oqSJ53N0oCJfFWsAkqjfPmEQCdEYH1
nGK/coGwOXdqPxirjFe1cSQ=
=9mz6
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to