* SECURITY UPDATE: denial of service and possible code execution via
multiple issues (LP: #1444363)
- debian/patches/60_cve-2015-0261.diff: check lengths in
print-mobility.c.
- debian/patches/60_cve-2015-2153.diff: check length in
print-rpki-rtr.c.
- debian/patches/60_cve-2015-2153-fix-regression.diff: more length
checks in print-rpki-rtr.c.
- debian/patches/60_cve-2015-2154.diff: check lengths in
print-isoclns.c.
- debian/patches/60_cve-2015-2155.diff: make sure ops->print is valid
in print-forces.c.
- CVE-2015-0261
- CVE-2015-2153
- CVE-2015-2154
- CVE-2015-2155
-- Marc Deslauriers <email address hidden> Fri, 24 Apr 2015 12:51:00 -0400
This bug was fixed in the package tcpdump - 4.6.2-1ubuntu1.2
---------------
tcpdump (4.6.2-1ubuntu1.2) utopic-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code execution via patches/ 60_cve- 2015-0261. diff: check lengths in mobility. c. patches/ 60_cve- 2015-2153. diff: check length in rpki-rtr. c. patches/ 60_cve- 2015-2153- fix-regression. diff: more length patches/ 60_cve- 2015-2154. diff: check lengths in isoclns. c. patches/ 60_cve- 2015-2155. diff: make sure ops->print is valid
multiple issues (LP: #1444363)
- debian/
print-
- debian/
print-
- debian/
checks in print-rpki-rtr.c.
- debian/
print-
- debian/
in print-forces.c.
- CVE-2015-0261
- CVE-2015-2153
- CVE-2015-2154
- CVE-2015-2155
-- Marc Deslauriers <email address hidden> Fri, 24 Apr 2015 12:51:00 -0400