News for package tcpdump

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 3.0 (quilt)
Source: tcpdump
Binary: tcpdump
Architecture: any
Version: 4.6.2-3
Maintainer: Romain Francoise <[email protected]>
Homepage: http://www.tcpdump.org/
Standards-Version: 3.9.5
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=users/rfrancoise/tcpdump.git
Vcs-Git: git://anonscm.debian.org/users/rfrancoise/tcpdump.git
Build-Depends: dpkg-dev (>= 1.16.1~), debhelper (>= 8.9.4~), libpcap0.8-dev (>= 1.5), libssl-dev, autotools-dev, autoconf
Package-List:
 tcpdump deb net optional arch=any
Checksums-Sha1:
 7256c47e572229de8c92f070514c1f6e6bb691d4 1105356 tcpdump_4.6.2.orig.tar.gz
 4c6fa903d476418d3c4d1249121f81458bc5ab96 17224 tcpdump_4.6.2-3.debian.tar.xz
Checksums-Sha256:
 524ee4d8e83a6c663f6879004216a9a5bcb1c68b11920d653eb87b79d008e0b8 1105356 tcpdump_4.6.2.orig.tar.gz
 30699fdc62faf7181ed77ce0012343f8431eaed4927783ddd447e673dc7f94db 17224 tcpdump_4.6.2-3.debian.tar.xz
Files:
 74d0d3728b3cdc60db872d842e7f1598 1105356 tcpdump_4.6.2.orig.tar.gz
 9273e2d61de9aa678ab18b3b2cbde580 17224 tcpdump_4.6.2-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Xv5q
-----END PGP SIGNATURE-----

Changes:
tcpdump (4.6.2-3) unstable; urgency=high

  * Cherry-pick commit 0f95d441e4 from upstream Git to fix a buffer overflow
    in the PPP dissector (CVE-2014-9140).

 -- Romain Francoise <[email protected]>  Sat, 29 Nov 2014 12:23:53 +0100