[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted wireshark 0.99.2-6~bpo.1 (source i386)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 14 Sep 2006 16:51:32 +0000
Source: wireshark
Binary: wireshark ethereal-dev wireshark-common tshark wireshark-dev ethereal ethereal-common tethereal
Architecture: source i386
Version: 0.99.2-6~bpo.1
Distribution: sarge-backports
Urgency: high
Maintainer: Frederic Peters <fpeters@debian.org>
Changed-By: Norbert Tretkowski <nobse@backports.org>
Description: 
 ethereal   - dummy upgrade package for ethereal -> wireshark
 ethereal-common - dummy upgrade package for ethereal -> wireshark
 ethereal-dev - dummy upgrade package for ethereal -> wireshark
 tethereal  - dummy upgrade package for ethereal -> wireshark
 tshark     - network traffic analyzer (console)
 wireshark  - network traffic analyzer
 wireshark-common - network traffic analyser (common files)
 wireshark-dev - network traffic analyser (development tools)
Closes: 306426 315670 316082 318689 320453 321204 329889 344011 351941 353613 368860 376522 378745 380647 380986 381860 384529 385357
Changes: 
 wireshark (0.99.2-6~bpo.1) sarge-backports; urgency=low
 .
   * Rebuilt for sarge.
   * Reverted changes for updated python policy.
 .
 wireshark (0.99.2-6) unstable; urgency=low
 .
   * Acknowledge NMU, thank Steinar.
   * debian/wireshark-dev.postinst: removed rests of old Python module
     compilation, it is not needed by new policy.  (closes: #385357)
 .
 wireshark (0.99.2-5.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Backport security fixes from 0.99.3a (via Subversion); fixes
     CVE-2006-4331, CVE-2006-4333 (CVE-2006-4330 was fixed in last upload,
     and CVE-2006-4332 is not relevant for Debian). (Closes: #384529)
 .
 wireshark (0.99.2-5) unstable; urgency=low
 .
   * debian/patches/11_iscsi_dissector.dpatch: new patch, fixing bug reported
     against iSCSI dissector, taken from upstream (r18832) (closes: #381860)
 .
 wireshark (0.99.2-4) unstable; urgency=low
 .
   * debian/control: set ethereal-dev section to devel, it was lost in copy
     pasting.
   * debian/control, debian/rules, debian/pyversions: updated to new Python
     policy. (closes: #380986)
 .
 wireshark (0.99.2-3) unstable; urgency=low
 .
   * debian/control: added dummy transitional packages to provide an upgrade
     path from ethereal.  (closes: #380647)
 .
 wireshark (0.99.2-2) unstable; urgency=low
 .
   * debian/rules: set --datadir so that DATAFILE_DIR is correct (it was
     wrongly set to "${prefix}/share/wireshark" and not expanded.
     * AUTHORS-SHORT is now displayed correclty in about dialog
     * colofilters is now found and used properly
 .
 wireshark (0.99.2-1) unstable; urgency=high
 .
   * New upstream release. (closes: #378745)
     * The project changed name, ethereal is now wireshark. (closes: #351941)
       See http://www.wireshark.org/news/20060607.html
       * tethereal has been renamed to tshark
       * idl2eth has been renamed to idl2wrs
     * Urgency high since it fixes security issues
       * http://www.wireshark.org/security/wnpa-sec-2006-01.html has details
       * crash in GSM BSSMAP dissector (CVE-2006-3627)
       * format string overflow in ANSI MAP dissector (CVE-2006-3628)
       * format string overflow in Checkpoint FW-1 dissector (CVE-2006-3628)
       * format string overflow in MQ dissector (CVE-2006-3628)
       * format string overflow in XML dissector (CVE-2006-3628)
       * large memory allocation in MOUNT dissector (CVE-2006-3629)
       * off-by-one errors in NCP NMAS and NDPS dissectors (CVE-2006-3630)
       * format string overflow in NTP dissector (CVE-2006-3628)
       * infinite loop in SSH dissector (CVE-2006-3631)
       * buffer overflow in NFS dissector (CVE-2006-3632)
   * debian/wireshark-dev.header-files: includes missing files
     (closes: #376522, #368860)
   * debian/copyright: list source files that are under a license different
     than Wireshark.
 .
 ethereal (0.99.0-1) unstable; urgency=high
 .
   * New upstream release (urgency high since it fixes security issues;
     see http://www.ethereal.com/appnotes/enpa-sa-00023.html advisory)
     * crash in H.248 dissector (CVE-2006-1937)
     * infinite loop in UMA dissector (CVE-2006-1933)
     * crash in X.509if dissector (CVE-2006-1937)
     * crash in SRVLOC dissector (CVE-2006-1937)
     * crash in H.245 dissector (CVE-2006-1937)
     * off-by-one error in OID printing routine (CVE-2006-1932)
     * buffer overflow in COPS dissector (CVE-2006-1935)
     * buffer overflow in ALCAP dissector (CVE-2006-1934)
     * crash in statistics counter (CVE-2006-1937)
     * crash with malformed capture (CVE-2006-1938)
     * crash with invalid display filter (CVE-2006-1939)
     * crash in general packet dissector (CVE-2006-1937)
     * crash in AIM dissector (CVE-2006-1937)
     * crash in RPC dissector (CVE-2006-1939)
     * crash in DCERPC dissector (CVE-2006-1939)
     * crash in ASN.1 dissector (CVE-2006-1939)
     * crash in SMB PIPE dissector (CVE-2006-1938)
     * excessive loop in BER dissector (CVE-2006-1933)
     * abort in SNDCP dissector (CVE-2006-1940)
     * buffer overrun in Network Instruments file code (CVE-2006-1934)
     * buffer overrun in NetXray/Windows Sniffer file code (CVE-2006-1934)
     * crash in GSM SMS dissector (CVE-2006-1939)
     * buffer overrun in ALCAP dissector (CVE-2006-1934)
     * buffer overrun in telnet dissector (CVE-2006-1936)
     * crash in ASN.1 based dissectors (CVE-2006-1939)
     * crash in DCERPC NT dissector (CVE-2006-1939)
     * crash in PER dissector (CVE-2006-1939)
   * debian/patches/04_drop-capabilities.dpatch: updated.
   * debian/control: added build-depends on libgnutls-dev since libgnutls can
     now be used for SSL support.
 .
 ethereal (0.10.14-2) unstable; urgency=low
 .
   * debian/watch: added watch file.
 .
 ethereal (0.10.14-1) unstable; urgency=low
 .
   * New upstream release.
   * Acknowledge NMU, thanks for the support while I was away.
   * debian/patches/11-security-CVE-2005-3651.dpatch: removed since included
     upstream.
   * debian/patches/07_gcc4.dpatch: removed part about packet-cms since it now
     causes the build to fail.
 .
 ethereal (0.10.13-1.3) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Build-conflict with libsnmp-dev, not just libsnmp5-dev, to prevent
     accidental linkage with openssl.  Closes: #353613.
 .
 ethereal (0.10.13-1.2) unstable; urgency=high
 .
   * Non-maintainer upload.
   * High-urgency upload for RC bugfix.
   * Add missing epan/gnuc_format_check.h, epan/ipv6-utils.h headers to
     ethereal-dev.  Closes: #344011.
   * Build-depend on automake1.9 instead of automake; the latter points to
     the ancient automake1.4 package, which was not what's used upstream.
 .
 ethereal (0.10.13-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Fix buffer overflow in OSPF dissector (CVE-2005-3651)
 .
 ethereal (0.10.13-1) unstable; urgency=high
 .
   * New upstream release (urgency high since it fixes security issues;
     see http://www.ethereal.com/appnotes/enpa-sa-00021.html advisory)
     * memory exhaustion by ISAKMP, FC-FCS, RSVP, ISIS LSP dissectors
       (CAN-2005-3241)
     * crash in IrDA dissector and SMB transaction payload reassembly
       (CAN-2005-3242)
     * buffer overflow in AgentX and SLIMP3 dissectors (CAN-2005-3243)
     * infinite loop in BER dissector (CAN-2005-3244)
     * memory exhaustion by ONC RPC dissector with option "Dissect unknown RPC
       program numbers" (CAN-2005-3245)
     * NULL pointer in sFlow, RTnet, SCSI dissectors (CAN-2005-3246)
     * infinite loop and crash in SigComp UDVM (CAN-2005-3247)
     * division by zero in X11 dissector (CAN-2005-3248)
     * invalid pointer freed in WSP dissecto (CAN-2005-3249)
     * buffer overflow in SRVLOC dissector (CAN-2005-3184)
   * debian/patches/04_drop-capabilities.dpatch: updated
   * debian/patches/08_ethereal-desktop-menu.dpatch: updated
   * debian/patches/09_idl2eth.dpatch: updated
 .
 ethereal (0.10.12-6) unstable; urgency=low
 .
   * Rebuilt with gtk/atk from unstable. (closes: #329889)
 .
 ethereal (0.10.12-5) unstable; urgency=low
 .
   * debian/ethereal-dev.header-files: added missing epan/range.h
     (closes: #306426)
 .
 ethereal (0.10.12-4) unstable; urgency=low
 .
   * debian/control: upgraded automake dependency of ethereal-dev to 1.8.
   * debian/patches/11_diameter_vendors.dpatch: removed, wrong.
   * debian/ethereal-common.files: add capinfos.
   * debian/ethereal-common.manpages: add capinfos man page.
   * debian/changelog: fixed 0.6.3-2 header line since lintian now complains
     about the old way of closing bugs from changelogs.
 .
 ethereal (0.10.12-3) unstable; urgency=low
 .
   * debian/patches/04_drop-capabilities.dpatch: don't exit on failure, simply
     skip the capabilities part; use g_warning to output messages.
     (closes: #321204)
 .
 ethereal (0.10.12-2) unstable; urgency=low
 .
   * debian/patches/04_drop-capabilities.dpatch: preserves CAP_DAC_READ_SEARCH
     which seems necessary for sudo usage (closes: #320453)
 .
 ethereal (0.10.12-1) unstable; urgency=high
 .
   * New upstream release; urgency high since it fixes security issues in many
     dissectors; see http://www.ethereal.com/appnotes/enpa-sa-00020.html
 .
 ethereal (0.10.11-5) unstable; urgency=low
 .
   * debian/patches/11_diameter_vendors.dpatch: correctly add diameter vendors
     (patch by Joost Yervante Damad) (closes: #316082)
 .
 ethereal (0.10.11-4) unstable; urgency=low
 .
   * debian/: now using dpatch, started from Ubuntu patch, merged with current
     package patches.
 .
 ethereal (0.10.11-3) unstable; urgency=low
 .
   * Modified capabilities patch so it doesn't try to keep CAP_NET_RAW if it
     doesn't have it. (closes: #318689)
 .
 ethereal (0.10.11-2) unstable; urgency=low
 .
   * Use capabilities to mitigate security risk, patch from J.H.M. Dassen (Ray)
     (closes: #315670)
   * debian/control: build-depends on libcap-dev
   * epan/dissectors/packet-cmip.c: fixed dissect_cmip_InvokeIDType declaration
     mismatch.
 .
 ethereal (0.10.11-1) unstable; urgency=high
 .
   * New upstream release; urgency high since it fixes security issues in the
     following dissectors:
     * format string vulnerabilities: ANSI A, DHCP
     * segmentation faults: GSM MAP, AIM, TZSP, Bittorrent, SMB, GSM, SMB
       NETLOGON
     * buffer overflows: DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS,
       OCSP, PKIX1Explitit, PKIX Qualified, X.509, NCP, ISUP, TCAP,
       Presentation
     * null pointer exception: KINK, WSP, SMB Mailslot, H.245, MGCP, RPC
     * infinite loops: LMP, EIGRP, MEGACO, L2TP
     * uncaught assertions: Telnet, 802.3, BER, IAX2, RADIUS, SMB PIPE, MRDISC
     * memory exhaustion: DICOM
     * unclassified: Fibre Channel, LDAP, NTLMSSP
Files: 
 4534323ea73f9f85ba3704be04a7d7c1 1033 net optional wireshark_0.99.2-6~bpo.1.dsc
 46d3b7c9766960fb34782c2078c50d13 12358081 net optional wireshark_0.99.2.orig.tar.gz
 2f2643d2222822a2b69199dbf45e30ff 90429 net optional wireshark_0.99.2-6~bpo.1.diff.gz
 660f047ef4bd6a227d9d41eafb7fa353 6844436 net optional wireshark-common_0.99.2-6~bpo.1_i386.deb
 1ba1368988fef33499c964e9ef53b5f7 531082 net optional wireshark_0.99.2-6~bpo.1_i386.deb
 a1bf74b9eeead79f0f607d806a2dbf60 97596 net optional tshark_0.99.2-6~bpo.1_i386.deb
 9652a47185604e72126fa7513e42ec79 171802 devel optional wireshark-dev_0.99.2-6~bpo.1_i386.deb
 57b48442c375bb768f7e568c71d92a0f 21196 net optional ethereal-common_0.99.2-6~bpo.1_i386.deb
 1c0064c0172ed23fd5d7e781b43e5470 21194 devel optional ethereal-dev_0.99.2-6~bpo.1_i386.deb
 83751f1f230d03c47cc677e228c31fa6 21180 net optional ethereal_0.99.2-6~bpo.1_i386.deb
 89511fbc79cec03b1cbc04e940849585 21190 net optional tethereal_0.99.2-6~bpo.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFDB+br/RnCw96jQERAjMvAKC22O2r5WLimNaj/kplrxrMFwZmBwCeORZm
cE12BSTweSfrPpBajZk5YO8=
=NeFs
-----END PGP SIGNATURE-----


Accepted:
ethereal-common_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/ethereal-common_0.99.2-6~bpo.1_i386.deb
ethereal-dev_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/ethereal-dev_0.99.2-6~bpo.1_i386.deb
ethereal_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/ethereal_0.99.2-6~bpo.1_i386.deb
tethereal_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/tethereal_0.99.2-6~bpo.1_i386.deb
tshark_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/tshark_0.99.2-6~bpo.1_i386.deb
wireshark-common_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/wireshark-common_0.99.2-6~bpo.1_i386.deb
wireshark-dev_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/wireshark-dev_0.99.2-6~bpo.1_i386.deb
wireshark_0.99.2-6~bpo.1.diff.gz
  to pool/main/w/wireshark/wireshark_0.99.2-6~bpo.1.diff.gz
wireshark_0.99.2-6~bpo.1.dsc
  to pool/main/w/wireshark/wireshark_0.99.2-6~bpo.1.dsc
wireshark_0.99.2-6~bpo.1_i386.deb
  to pool/main/w/wireshark/wireshark_0.99.2-6~bpo.1_i386.deb
wireshark_0.99.2.orig.tar.gz
  to pool/main/w/wireshark/wireshark_0.99.2.orig.tar.gz



Reply to: