apticron report [Mon, 30 Jan 2017 09:48:21 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
liblcms2-2 2.6-3+deb8u1
tcpdump 4.9.0-1~deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour lcms2 (liblcms2-2) ---
lcms2 (2.6-3+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Added an extra check to MLU bounds (CVE-2016-10165) (Closes: #852627)
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 27 Jan 2017 14:26:09 +0100
--- Modifications pour tcpdump ---
tcpdump (4.9.0-1~deb8u1) jessie-security; urgency=high
* Backport to jessie:
+ Re-enable crypto support.
+ Disable tests that require newer libpcap features: Geneve (1.7) and
file format version checks (1.8), and relax B-D on libpcap0.8-dev.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 28 Jan 2017 17:11:07 +0100
tcpdump (4.9.0-1) unstable; urgency=high
* New upstream security release, fixing the following:
+ CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
+ CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
+ CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
+ CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
+ CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
+ CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
+ CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
+ CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
+ CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
+ CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
+ CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
+ CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
+ CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
+ CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
+ CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
+ CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
+ CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
+ CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
+ CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
+ CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
+ CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
+ CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
+ CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
+ CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
+ CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
+ CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
+ CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
lightweight resolver protocol, PIM).
+ CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
+ CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
+ CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
+ CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
+ CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
+ CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
print-ether.c:ether_print().
+ CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
+ CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
+ CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
+ CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
* Re-enable all tests and bump build-dep on libpcap0.8-dev to >= 1.8
accordingly.
* Switch Vcs-Git URL to the https one.
* Adjust lintian override name about dh 9.
-- Romain Francoise <rfrancoise(a)debian.org> Thu, 26 Jan 2017 20:04:11 +0100
tcpdump (4.8.1-2) unstable; urgency=medium
* Disable new HNCP test, which fails on some buildds for some
as-of-yet unexplained reason.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 29 Oct 2016 19:40:01 +0200
tcpdump (4.8.1-1) unstable; urgency=medium
* New upstream release.
* Re-enable Geneve tests (disabled in 4.7.4-1) and bump build-dep on
libpcap0.8-dev to >= 1.7 accordingly.
* Disable new pcap version tests which require libpcap 1.8+.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 29 Oct 2016 17:16:06 +0200
tcpdump (4.7.4-3) unstable; urgency=medium
* Use dh-autoreconf instead of calling autoconf directly and patching
config.{guess,sub}.
* Call dh_auto_configure instead of configure in override target, patch
by Helmut Grohne (closes: #837951).
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 17 Sep 2016 11:18:45 +0200
tcpdump (4.7.4-2) unstable; urgency=medium
* Disable crypto support as it causes FTBFS with OpenSSL 1.1.x and we
don't have a working fix upstream yet (closes: #828569).
* Bump Standards-Version to 3.9.8.
* Use cgit URL for Vcs-Browser.
-- Romain Francoise <rfrancoise(a)debian.org> Sun, 28 Aug 2016 18:16:50 +0200
tcpdump (4.7.4-1) unstable; urgency=medium
* New upstream release.
* Disable two geneve tests that require libpcap 1.7+.
* Bump Standards-Version to 3.9.6.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 23 May 2015 18:25:01 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
hexagon.federez.net
--
apticron