Back to tcpdump PTS page

Accepted tcpdump 4.9.0-1~deb8u1 (amd64 source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 28 Jan 2017 17:11:07 +0100
Source: tcpdump
Binary: tcpdump
Architecture: amd64 source
Version: 4.9.0-1~deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Romain Francoise <rfrancoise@debian.org>
Changed-By: Romain Francoise <rfrancoise@debian.org>
Closes: 828569 837951
Description: 
 tcpdump    - command-line network traffic analyzer
Changes:
 tcpdump (4.9.0-1~deb8u1) jessie-security; urgency=high
 .
   * Backport to jessie:
     + Re-enable crypto support.
     + Disable tests that require newer libpcap features: Geneve (1.7) and
       file format version checks (1.8), and relax B-D on libpcap0.8-dev.
 .
 tcpdump (4.9.0-1) unstable; urgency=high
 .
   * New upstream security release, fixing the following:
     + CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
     + CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
     + CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
     + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
     + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
     + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
     + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
     + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
     + CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
     + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
     + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
     + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
     + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
     + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
     + CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
     + CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
     + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
     + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
     + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
     + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
     + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
     + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
     + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
     + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
     + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
     + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
     + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
     + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
       buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
       lightweight resolver protocol, PIM).
     + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
     + CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
     + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
     + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
     + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
     + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
     + CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
     + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
       OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
       print-ether.c:ether_print().
     + CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
     + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
     + CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
     + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
     + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
   * Re-enable all tests and bump build-dep on libpcap0.8-dev to >= 1.8
     accordingly.
   * Switch Vcs-Git URL to the https one.
   * Adjust lintian override name about dh 9.
 .
 tcpdump (4.8.1-2) unstable; urgency=medium
 .
   * Disable new HNCP test, which fails on some buildds for some
     as-of-yet unexplained reason.
 .
 tcpdump (4.8.1-1) unstable; urgency=medium
 .
   * New upstream release.
   * Re-enable Geneve tests (disabled in 4.7.4-1) and bump build-dep on
     libpcap0.8-dev to >= 1.7 accordingly.
   * Disable new pcap version tests which require libpcap 1.8+.
 .
 tcpdump (4.7.4-3) unstable; urgency=medium
 .
   * Use dh-autoreconf instead of calling autoconf directly and patching
     config.{guess,sub}.
   * Call dh_auto_configure instead of configure in override target, patch
     by Helmut Grohne (closes: #837951).
 .
 tcpdump (4.7.4-2) unstable; urgency=medium
 .
   * Disable crypto support as it causes FTBFS with OpenSSL 1.1.x and we
     don't have a working fix upstream yet (closes: #828569).
   * Bump Standards-Version to 3.9.8.
   * Use cgit URL for Vcs-Browser.
 .
 tcpdump (4.7.4-1) unstable; urgency=medium
 .
   * New upstream release.
   * Disable two geneve tests that require libpcap 1.7+.
   * Bump Standards-Version to 3.9.6.
Checksums-Sha1: 
 fc617ed2ab20f009681c257bfb1ad29cc3ab118e 1950 tcpdump_4.9.0-1~deb8u1.dsc
 2c4193685edb1040506a9ec0f15cd85825085697 1260309 tcpdump_4.9.0.orig.tar.gz
 b06d2ad5656e91419cf4c7e584c51c8c125eadec 12652 tcpdump_4.9.0-1~deb8u1.debian.tar.xz
 9cf08230af57d2ea9a65ffd5b6fd9916dc1f4d83 409708 tcpdump_4.9.0-1~deb8u1_amd64.deb
Checksums-Sha256: 
 2a8790a9fc5c25edecfe1bb8ad206c922f202ba8f7b865090d12cef9513a228d 1950 tcpdump_4.9.0-1~deb8u1.dsc
 eae98121cbb1c9adbedd9a777bf2eae9fa1c1c676424a54740311c8abcee5a5e 1260309 tcpdump_4.9.0.orig.tar.gz
 4dfc0f7bb41927ce587f0c9eb174d0740835deb288e5eff8448b7cc953eb535f 12652 tcpdump_4.9.0-1~deb8u1.debian.tar.xz
 16f8d983ddcc5a249254a285e711f14952b685b74f67d965d5a01e776a594f0b 409708 tcpdump_4.9.0-1~deb8u1_amd64.deb
Files: 
 0fdf1a7e391973e481d903b204d18610 1950 net optional tcpdump_4.9.0-1~deb8u1.dsc
 2b83364eef53b63ca3181b4eb56dab0c 1260309 net optional tcpdump_4.9.0.orig.tar.gz
 1a4daaae313087ca6383e91bf1095fed 12652 net optional tcpdump_4.9.0-1~deb8u1.debian.tar.xz
 cee238fbdbc9a6e370bd49198ac9cb5d 409708 net optional tcpdump_4.9.0-1~deb8u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=C0WK
-----END PGP SIGNATURE-----