-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 26 Jan 2017 20:04:11 +0100
Source: tcpdump
Binary: tcpdump
Architecture: source
Version: 4.9.0-1
Distribution: unstable
Urgency: high
Maintainer: Romain Francoise <rfranco...@debian.org>
Changed-By: Romain Francoise <rfranco...@debian.org>
Description:
 tcpdump    - command-line network traffic analyzer
Changes:
 tcpdump (4.9.0-1) unstable; urgency=high
 .
   * New upstream security release, fixing the following:
     + CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
     + CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
     + CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
     + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
     + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
     + CVE-2016-7927: buffer overflow in 
print-802_11.c:ieee802_11_radio_print().
     + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
     + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
     + CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
     + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
     + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
     + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
     + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
     + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
     + CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
     + CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
     + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
     + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
     + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
     + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
     + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
     + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
     + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
     + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
     + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
     + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
     + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
     + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
       buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
       lightweight resolver protocol, PIM).
     + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
     + CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
     + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
     + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
     + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
     + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
     + CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
     + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
       OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
       print-ether.c:ether_print().
     + CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
     + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
     + CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
     + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
     + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
   * Re-enable all tests and bump build-dep on libpcap0.8-dev to >= 1.8
     accordingly.
   * Switch Vcs-Git URL to the https one.
   * Adjust lintian override name about dh 9.
Checksums-Sha1:
 c403e2982487f92df14a59ed36ea80133d028857 1910 tcpdump_4.9.0-1.dsc
 2c4193685edb1040506a9ec0f15cd85825085697 1260309 tcpdump_4.9.0.orig.tar.gz
 1f98b04b991d0daeaf7e1a061e1c150d44823638 12136 tcpdump_4.9.0-1.debian.tar.xz
Checksums-Sha256:
 466d1863ea5901104fb3009d666995992086b57f4e981856f552af6cb96900fc 1910 
tcpdump_4.9.0-1.dsc
 eae98121cbb1c9adbedd9a777bf2eae9fa1c1c676424a54740311c8abcee5a5e 1260309 
tcpdump_4.9.0.orig.tar.gz
 f146d224324154da2d0bc310ac8f80e8f40f869245c33cc815b4e1f36e0c7aa7 12136 
tcpdump_4.9.0-1.debian.tar.xz
Files:
 8315113d49652ff6edf4721ffb843e41 1910 net optional tcpdump_4.9.0-1.dsc
 2b83364eef53b63ca3181b4eb56dab0c 1260309 net optional tcpdump_4.9.0.orig.tar.gz
 b9c3eb22520d1ca7bda48df78c6688a6 12136 net optional 
tcpdump_4.9.0-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=4zlT
-----END PGP SIGNATURE-----

Reply via email to