-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 3.0 (quilt) Source: tcpdump Binary: tcpdump Architecture: any Version: 4.6.2-5 Maintainer: Romain Francoise <[email protected]> Homepage: http://www.tcpdump.org/ Standards-Version: 3.9.5 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=users/rfrancoise/tcpdump.git Vcs-Git: git://anonscm.debian.org/users/rfrancoise/tcpdump.git Build-Depends: dpkg-dev (>= 1.16.1~), debhelper (>= 8.9.4~), libpcap0.8-dev (>= 1.5), libssl-dev, autotools-dev, autoconf Package-List: tcpdump deb net optional arch=any Checksums-Sha1: 7256c47e572229de8c92f070514c1f6e6bb691d4 1105356 tcpdump_4.6.2.orig.tar.gz 9d7c00f17594b0f86493bb8c422bde2da2f7e36f 19116 tcpdump_4.6.2-5.debian.tar.xz Checksums-Sha256: 524ee4d8e83a6c663f6879004216a9a5bcb1c68b11920d653eb87b79d008e0b8 1105356 tcpdump_4.6.2.orig.tar.gz 1549546da6b024de3fcbd267f89a877ba188efeb136b799cf513785eac97c528 19116 tcpdump_4.6.2-5.debian.tar.xz Files: 74d0d3728b3cdc60db872d842e7f1598 1105356 tcpdump_4.6.2.orig.tar.gz 7fbfc04a3accfb93e4720d2260c28f55 19116 tcpdump_4.6.2-5.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJVIB4oAAoJEK0V9DXwX5Yt2AMQAMUTVTc511YzTQbO7UVlhk1P KCLPIP0bfRcjRlBpkNTp0IPZNQ9PHuMWa5rMXPQa1E58RVmpbyzY0e0S78KR++o3 KSRQrQ+JpMC4svgH2mDY6PRfzkZH55mKdUleCLoo03xIDmw0aIqKlxUOHD/0aLKu DMe7Fb7CDi2zkW1mPuRR5/VyhU5iQm2le/zcMQrj9HZhpG2lyVJNlqNmVi7a8GW8 sbqwnnonCPUlQA4Lviej31UkY20Khjz2T89QbWNU9794zir5nMKT/HGqGNaVoX88 peZRIgojPmyztzaS/NQfowSh2Gyg3LBoKYDso+AhKAWVJOfPMQn+nJ1jlEc5Lq+R w9t6b8QZq1zbMyvQMYnXuIuc5GA0Cfy36s1/zNCeunh6n115/wC/65oqf2d9Xx4j Tir+Xa6yaubjw7M8+0FvpXLybDJKXgsjmdNSmeCMdVj3vH02nohM/gmW4U7D/Ajz voNxJ08BEr0I7fuSfk6jSKCVU0T0ULGm9gJSpjKnTBeBQz24eNNWnBcmYOjSWE9E 22nGDxUl9lgjDBbqCwUlgLyz0S8xdOwNNraY/Crl57bYFVLnnGLLtU1c9K6aZvMi MdzdbBroayGRkAKnOsBkJIUqhLCaeV4YrVpzajZbjN8hVwe8+NJlFEbW4UFG8DXH iXODN/vsex6vj0GMrxk1 =Jn9g -----END PGP SIGNATURE----- Changes: tcpdump (4.6.2-5) unstable; urgency=high * Cherry-pick commit fb6e5377f3 from upstream Git to fix regressions in the RPKI/RTR printer after the CVE-2015-2153 changes. Thanks to Artur Rona from Ubuntu for the heads-up (closes: #781362). -- Romain Francoise <[email protected]> Sat, 04 Apr 2015 19:10:27 +0200