-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 3.0 (quilt) Source: tcpdump Binary: tcpdump Architecture: any Version: 4.6.2-3 Maintainer: Romain Francoise <[email protected]> Homepage: http://www.tcpdump.org/ Standards-Version: 3.9.5 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=users/rfrancoise/tcpdump.git Vcs-Git: git://anonscm.debian.org/users/rfrancoise/tcpdump.git Build-Depends: dpkg-dev (>= 1.16.1~), debhelper (>= 8.9.4~), libpcap0.8-dev (>= 1.5), libssl-dev, autotools-dev, autoconf Package-List: tcpdump deb net optional arch=any Checksums-Sha1: 7256c47e572229de8c92f070514c1f6e6bb691d4 1105356 tcpdump_4.6.2.orig.tar.gz 4c6fa903d476418d3c4d1249121f81458bc5ab96 17224 tcpdump_4.6.2-3.debian.tar.xz Checksums-Sha256: 524ee4d8e83a6c663f6879004216a9a5bcb1c68b11920d653eb87b79d008e0b8 1105356 tcpdump_4.6.2.orig.tar.gz 30699fdc62faf7181ed77ce0012343f8431eaed4927783ddd447e673dc7f94db 17224 tcpdump_4.6.2-3.debian.tar.xz Files: 74d0d3728b3cdc60db872d842e7f1598 1105356 tcpdump_4.6.2.orig.tar.gz 9273e2d61de9aa678ab18b3b2cbde580 17224 tcpdump_4.6.2-3.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJUea9cAAoJEK0V9DXwX5YtNWcQANG/OA6KITuvq7odvB58Fnpn qRpOcGSlwho5Q2cTlOSSGKBGeIdGIukJB9y+DTCXUhpuetmKpd+ISJK0BpT+r3yz sO7DMvQbdD0aTVMVpCpacBCx2Qax2SCZ8mVZCujrGzCQgiN7P729U9IavCuj7guW U6JJZNex2G69DxfV4t/w51ySjZJiqVFELo8fTKKwwoWKZCqrxrhk+PyX8MV/f4aP FMWbIcLFaZ0eH98Djha+GaOBI7MVtmu3PpjsWGvkaGkQOnbDrNG+VBRGkx93d1di 6Mb1sZsmuGjgJgeigxKcU003w3kxciTdsyyWC32oh9M0tWqVuTta43ktczgDiohB Hu/xiFPTzLMN9BkVeVn8ALTsjsLyEz9cFxeGYY52zTBrusrN3Yv6GMlQbEclcMJp FN1smH+EHjJ807FfO17SRUg7P4Pn2pXVPkD1MefVH3lqBas9mBqFlvi4cZCAdULQ m+iTpmuSa5sWhg26uGsAIk3aDShYKTTHksxvWK5v5aAbrgtpYNwClDeovo+Cm4xW RO0XuCgUCQulzvADuPteMHb0nNzBYJnUYuKT1t5vatq7527TA3nrFmAOh25ZTxPU sFKJL3LfFxuo3fa29JTowMwtU4QISUJlRnyaJn6ji4TXdBvDcjOvDGhEV8ygNfF2 x9Frf2hgiLV2pHEFCH6v =Xv5q -----END PGP SIGNATURE----- Changes: tcpdump (4.6.2-3) unstable; urgency=high * Cherry-pick commit 0f95d441e4 from upstream Git to fix a buffer overflow in the PPP dissector (CVE-2014-9140). -- Romain Francoise <[email protected]> Sat, 29 Nov 2014 12:23:53 +0100