-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 25 Dec 2007 17:32:38 +0100 Source: tcpreen Binary: tcpreen Architecture: source i386 Version: 1.4.3-0.2 Distribution: unstable Urgency: high Maintainer: Oliver Kurth <oku@debian.org> Changed-By: Nico Golde <nion@debian.org> Description: tcpreen - Simple TCP re-engineering tool Closes: 457781 Changes: tcpreen (1.4.3-0.2) unstable; urgency=high . * Non-maintainer upload by security team. * This update addresses the following security issue: - remote buffer-overflow vulnerability in bridge.cpp because tcpreen fails to check user supplied data passed to the monitor_bridge function (Closes: #457781). Files: f727e336e731e4c90f91b8ef08bfad7b 569 net optional tcpreen_1.4.3-0.2.dsc aa605f217d6753bc7957ef9383d9c97c 26272 net optional tcpreen_1.4.3-0.2.diff.gz db1329b8909922f925dffa1a28e70b5e 40202 net optional tcpreen_1.4.3-0.2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHcT+THYflSXNkfP8RAuCwAKCbc+NUJD1cwPPUSIv50z1nwqRAsgCeJ0lL XVlqkzRmCwfHYfLFjHHukXs= =qBDa -----END PGP SIGNATURE----- Accepted: tcpreen_1.4.3-0.2.diff.gz to pool/main/t/tcpreen/tcpreen_1.4.3-0.2.diff.gz tcpreen_1.4.3-0.2.dsc to pool/main/t/tcpreen/tcpreen_1.4.3-0.2.dsc tcpreen_1.4.3-0.2_i386.deb to pool/main/t/tcpreen/tcpreen_1.4.3-0.2_i386.deb