CVE-2015-2155 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2155): The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. CVE-2015-2154 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2154): The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value. CVE-2015-2153 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2153): The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU). CVE-2015-0261 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0261): Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value. Maintainers: if 4.7.4 is ready for stabilization, then please CC arch teams.
Arch teams, please test and mark stable: =net-analyzer/tcpdump-4.7.4 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 =net-libs/libpcap-1.7.3 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
amd64 stable
Stable for PPC64.
x86 stable
(In reply to Mikle Kolyada from comment #4) > x86 stable No.
(In reply to Jeroen Roovers from comment #5) > (In reply to Mikle Kolyada from comment #4) > > x86 stable > > No. Dear Jeroen, I appreciate that you double-check after people make commit/stabilize, but would be great if you could be more verbose about what is going wrong. In this case I guess that libpcap was not marked stable for x86, but in general we appreciate more verbosity. Thanks a lot.
ppc stable
Stable for HPPA.
arm stable
alpha stable
And again.
(In reply to Jeroen Roovers from comment #12) > And again. wrong. https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/net-analyzer/tcpdump/tcpdump-4.7.4.ebuild?r1=1.7&r2=1.8
(In reply to Mikle Kolyada from comment #13) > (In reply to Jeroen Roovers from comment #12) > > And again. > > wrong. > > https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/net-analyzer/ > tcpdump/tcpdump-4.7.4.ebuild?r1=1.7&r2=1.8 This is why you read the comments and not just the Summary when it comes to security stabilisations.
(In reply to Jeroen Roovers from comment #14) > (In reply to Mikle Kolyada from comment #13) > > (In reply to Jeroen Roovers from comment #12) > > > And again. > > > > wrong. > > > > https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/net-analyzer/ > > tcpdump/tcpdump-4.7.4.ebuild?r1=1.7&r2=1.8 > > This is why you read the comments and not just the Summary when it comes to > security stabilisations. did you mean libcap too?
sparc stable
ia64 stable. Cleanup, please! GLSA vote: yes.
Maintainer(s), Thank you for you for cleanup. GLSA Vote: Yes New GLSA Request filed.
This issue was resolved and addressed in GLSA 201510-04 at https://security.gentoo.org/glsa/201510-04 by GLSA coordinator Kristian Fiskerstrand (K_F).