[ubuntu/vivid-proposed] tcpdump 4.6.2-3ubuntu1 (Accepted)

Gianfranco Costamagna costamagnagianfranco at yahoo.it
Wed Dec 3 16:27:14 UTC 2014


tcpdump (4.6.2-3ubuntu1) vivid; urgency=low

  * Merge from Debian unstable (LP: #1397558).  Remaining changes:
  * debian/control:
    - Build-Depends on dh-apparmor.
    - Suggests apparmor
  * debian/README.Debian, debian/tcpdump.dirs, debian/usr.sbin.tcpdump,
    debian/patches/patches/90_man_apparmor.diff,
    debian/install, debian/rules:
    - Install enforcing AppArmor profile.
  * debian/usr.sbin.tcpdump: allow capability net_admin to support '-j'. Patch
    thanks to Graeme Hewson. (LP: #1229664)

tcpdump (4.6.2-3) unstable; urgency=high

  * Cherry-pick commit 0f95d441e4 from upstream Git to fix a buffer overflow
    in the PPP dissector (CVE-2014-9140).

tcpdump (4.6.2-2) unstable; urgency=high

  * Urgency high due to security fixes.
  * Add three patches extracted from various upstream commits fixing
    vulnerabilities in three dissectors:
    + CVE-2014-8767: missing bounds checks in OLSR dissector (closes: #770434).
    + CVE-2014-8768: missing bounds checks in Geonet dissector
      (closes: #770415).
    + CVE-2014-8769: missing bounds checks in AOVD dissector (closes: #770424).

Date: Sat, 29 Nov 2014 17:52:14 +0100
Changed-By: Gianfranco Costamagna <costamagnagianfranco at yahoo.it>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Daniel Holbach <daniel.holbach at ubuntu.com>
https://launchpad.net/ubuntu/+source/tcpdump/4.6.2-3ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 29 Nov 2014 17:52:14 +0100
Source: tcpdump
Binary: tcpdump
Architecture: source
Version: 4.6.2-3ubuntu1
Distribution: vivid
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Gianfranco Costamagna <costamagnagianfranco at yahoo.it>
Description:
 tcpdump    - command-line network traffic analyzer
Closes: 770415 770424 770434
Launchpad-Bugs-Fixed: 1229664 1397558
Changes:
 tcpdump (4.6.2-3ubuntu1) vivid; urgency=low
 .
   * Merge from Debian unstable (LP: #1397558).  Remaining changes:
   * debian/control:
     - Build-Depends on dh-apparmor.
     - Suggests apparmor
   * debian/README.Debian, debian/tcpdump.dirs, debian/usr.sbin.tcpdump,
     debian/patches/patches/90_man_apparmor.diff,
     debian/install, debian/rules:
     - Install enforcing AppArmor profile.
   * debian/usr.sbin.tcpdump: allow capability net_admin to support '-j'. Patch
     thanks to Graeme Hewson. (LP: #1229664)
 .
 tcpdump (4.6.2-3) unstable; urgency=high
 .
   * Cherry-pick commit 0f95d441e4 from upstream Git to fix a buffer overflow
     in the PPP dissector (CVE-2014-9140).
 .
 tcpdump (4.6.2-2) unstable; urgency=high
 .
   * Urgency high due to security fixes.
   * Add three patches extracted from various upstream commits fixing
     vulnerabilities in three dissectors:
     + CVE-2014-8767: missing bounds checks in OLSR dissector (closes: #770434).
     + CVE-2014-8768: missing bounds checks in Geonet dissector
       (closes: #770415).
     + CVE-2014-8769: missing bounds checks in AOVD dissector (closes: #770424).
Checksums-Sha1:
 3df6baf7687123f1672924a1e12a3179e57605a2 1395 tcpdump_4.6.2-3ubuntu1.dsc
 5d8e731671fd1bba2b995d9d239cf6c81d60987b 20060 tcpdump_4.6.2-3ubuntu1.debian.tar.xz
Checksums-Sha256:
 7a1917b4f2c5a0d0ceba5612c1a3c175b3d7b251a9508b196f9e645f83460f3a 1395 tcpdump_4.6.2-3ubuntu1.dsc
 8d5cc04fd62fdaa31d27f91d0055b6fff9c582048101dc328df9ced7702fbb29 20060 tcpdump_4.6.2-3ubuntu1.debian.tar.xz
Files:
 0b15716967d477d2811493ae92030672 1395 net optional tcpdump_4.6.2-3ubuntu1.dsc
 ca9f1cb2cd05a333c5bb2fb5cadfa02a 20060 net optional tcpdump_4.6.2-3ubuntu1.debian.tar.xz
Original-Maintainer: Romain Francoise <rfrancoise at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlR/ObQACgkQRjrlnQWd1etAWwCfVV8dEWL/DmcJXNM+2H3qSdZo
1j0AnjgLFfBIIWQApBnBimfsKQu6iD7s
=IHjW
-----END PGP SIGNATURE-----


More information about the Vivid-changes mailing list