Accepted wireshark 0.99.2-6~bpo.1 (source i386)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 14 Sep 2006 16:51:32 +0000
Source: wireshark
Binary: wireshark ethereal-dev wireshark-common tshark wireshark-dev ethereal ethereal-common tethereal
Architecture: source i386
Version: 0.99.2-6~bpo.1
Distribution: sarge-backports
Urgency: high
Maintainer: Frederic Peters <fpeters@debian.org>
Changed-By: Norbert Tretkowski <nobse@backports.org>
Description:
ethereal - dummy upgrade package for ethereal -> wireshark
ethereal-common - dummy upgrade package for ethereal -> wireshark
ethereal-dev - dummy upgrade package for ethereal -> wireshark
tethereal - dummy upgrade package for ethereal -> wireshark
tshark - network traffic analyzer (console)
wireshark - network traffic analyzer
wireshark-common - network traffic analyser (common files)
wireshark-dev - network traffic analyser (development tools)
Closes: 306426 315670 316082 318689 320453 321204 329889 344011 351941 353613 368860 376522 378745 380647 380986 381860 384529 385357
Changes:
wireshark (0.99.2-6~bpo.1) sarge-backports; urgency=low
.
* Rebuilt for sarge.
* Reverted changes for updated python policy.
.
wireshark (0.99.2-6) unstable; urgency=low
.
* Acknowledge NMU, thank Steinar.
* debian/wireshark-dev.postinst: removed rests of old Python module
compilation, it is not needed by new policy. (closes: #385357)
.
wireshark (0.99.2-5.1) unstable; urgency=medium
.
* Non-maintainer upload.
* Backport security fixes from 0.99.3a (via Subversion); fixes
CVE-2006-4331, CVE-2006-4333 (CVE-2006-4330 was fixed in last upload,
and CVE-2006-4332 is not relevant for Debian). (Closes: #384529)
.
wireshark (0.99.2-5) unstable; urgency=low
.
* debian/patches/11_iscsi_dissector.dpatch: new patch, fixing bug reported
against iSCSI dissector, taken from upstream (r18832) (closes: #381860)
.
wireshark (0.99.2-4) unstable; urgency=low
.
* debian/control: set ethereal-dev section to devel, it was lost in copy
pasting.
* debian/control, debian/rules, debian/pyversions: updated to new Python
policy. (closes: #380986)
.
wireshark (0.99.2-3) unstable; urgency=low
.
* debian/control: added dummy transitional packages to provide an upgrade
path from ethereal. (closes: #380647)
.
wireshark (0.99.2-2) unstable; urgency=low
.
* debian/rules: set --datadir so that DATAFILE_DIR is correct (it was
wrongly set to "${prefix}/share/wireshark" and not expanded.
* AUTHORS-SHORT is now displayed correclty in about dialog
* colofilters is now found and used properly
.
wireshark (0.99.2-1) unstable; urgency=high
.
* New upstream release. (closes: #378745)
* The project changed name, ethereal is now wireshark. (closes: #351941)
See http://www.wireshark.org/news/20060607.html
* tethereal has been renamed to tshark
* idl2eth has been renamed to idl2wrs
* Urgency high since it fixes security issues
* http://www.wireshark.org/security/wnpa-sec-2006-01.html has details
* crash in GSM BSSMAP dissector (CVE-2006-3627)
* format string overflow in ANSI MAP dissector (CVE-2006-3628)
* format string overflow in Checkpoint FW-1 dissector (CVE-2006-3628)
* format string overflow in MQ dissector (CVE-2006-3628)
* format string overflow in XML dissector (CVE-2006-3628)
* large memory allocation in MOUNT dissector (CVE-2006-3629)
* off-by-one errors in NCP NMAS and NDPS dissectors (CVE-2006-3630)
* format string overflow in NTP dissector (CVE-2006-3628)
* infinite loop in SSH dissector (CVE-2006-3631)
* buffer overflow in NFS dissector (CVE-2006-3632)
* debian/wireshark-dev.header-files: includes missing files
(closes: #376522, #368860)
* debian/copyright: list source files that are under a license different
than Wireshark.
.
ethereal (0.99.0-1) unstable; urgency=high
.
* New upstream release (urgency high since it fixes security issues;
see http://www.ethereal.com/appnotes/enpa-sa-00023.html advisory)
* crash in H.248 dissector (CVE-2006-1937)
* infinite loop in UMA dissector (CVE-2006-1933)
* crash in X.509if dissector (CVE-2006-1937)
* crash in SRVLOC dissector (CVE-2006-1937)
* crash in H.245 dissector (CVE-2006-1937)
* off-by-one error in OID printing routine (CVE-2006-1932)
* buffer overflow in COPS dissector (CVE-2006-1935)
* buffer overflow in ALCAP dissector (CVE-2006-1934)
* crash in statistics counter (CVE-2006-1937)
* crash with malformed capture (CVE-2006-1938)
* crash with invalid display filter (CVE-2006-1939)
* crash in general packet dissector (CVE-2006-1937)
* crash in AIM dissector (CVE-2006-1937)
* crash in RPC dissector (CVE-2006-1939)
* crash in DCERPC dissector (CVE-2006-1939)
* crash in ASN.1 dissector (CVE-2006-1939)
* crash in SMB PIPE dissector (CVE-2006-1938)
* excessive loop in BER dissector (CVE-2006-1933)
* abort in SNDCP dissector (CVE-2006-1940)
* buffer overrun in Network Instruments file code (CVE-2006-1934)
* buffer overrun in NetXray/Windows Sniffer file code (CVE-2006-1934)
* crash in GSM SMS dissector (CVE-2006-1939)
* buffer overrun in ALCAP dissector (CVE-2006-1934)
* buffer overrun in telnet dissector (CVE-2006-1936)
* crash in ASN.1 based dissectors (CVE-2006-1939)
* crash in DCERPC NT dissector (CVE-2006-1939)
* crash in PER dissector (CVE-2006-1939)
* debian/patches/04_drop-capabilities.dpatch: updated.
* debian/control: added build-depends on libgnutls-dev since libgnutls can
now be used for SSL support.
.
ethereal (0.10.14-2) unstable; urgency=low
.
* debian/watch: added watch file.
.
ethereal (0.10.14-1) unstable; urgency=low
.
* New upstream release.
* Acknowledge NMU, thanks for the support while I was away.
* debian/patches/11-security-CVE-2005-3651.dpatch: removed since included
upstream.
* debian/patches/07_gcc4.dpatch: removed part about packet-cms since it now
causes the build to fail.
.
ethereal (0.10.13-1.3) unstable; urgency=low
.
* Non-maintainer upload.
* Build-conflict with libsnmp-dev, not just libsnmp5-dev, to prevent
accidental linkage with openssl. Closes: #353613.
.
ethereal (0.10.13-1.2) unstable; urgency=high
.
* Non-maintainer upload.
* High-urgency upload for RC bugfix.
* Add missing epan/gnuc_format_check.h, epan/ipv6-utils.h headers to
ethereal-dev. Closes: #344011.
* Build-depend on automake1.9 instead of automake; the latter points to
the ancient automake1.4 package, which was not what's used upstream.
.
ethereal (0.10.13-1.1) unstable; urgency=high
.
* Non-maintainer upload.
* Fix buffer overflow in OSPF dissector (CVE-2005-3651)
.
ethereal (0.10.13-1) unstable; urgency=high
.
* New upstream release (urgency high since it fixes security issues;
see http://www.ethereal.com/appnotes/enpa-sa-00021.html advisory)
* memory exhaustion by ISAKMP, FC-FCS, RSVP, ISIS LSP dissectors
(CAN-2005-3241)
* crash in IrDA dissector and SMB transaction payload reassembly
(CAN-2005-3242)
* buffer overflow in AgentX and SLIMP3 dissectors (CAN-2005-3243)
* infinite loop in BER dissector (CAN-2005-3244)
* memory exhaustion by ONC RPC dissector with option "Dissect unknown RPC
program numbers" (CAN-2005-3245)
* NULL pointer in sFlow, RTnet, SCSI dissectors (CAN-2005-3246)
* infinite loop and crash in SigComp UDVM (CAN-2005-3247)
* division by zero in X11 dissector (CAN-2005-3248)
* invalid pointer freed in WSP dissecto (CAN-2005-3249)
* buffer overflow in SRVLOC dissector (CAN-2005-3184)
* debian/patches/04_drop-capabilities.dpatch: updated
* debian/patches/08_ethereal-desktop-menu.dpatch: updated
* debian/patches/09_idl2eth.dpatch: updated
.
ethereal (0.10.12-6) unstable; urgency=low
.
* Rebuilt with gtk/atk from unstable. (closes: #329889)
.
ethereal (0.10.12-5) unstable; urgency=low
.
* debian/ethereal-dev.header-files: added missing epan/range.h
(closes: #306426)
.
ethereal (0.10.12-4) unstable; urgency=low
.
* debian/control: upgraded automake dependency of ethereal-dev to 1.8.
* debian/patches/11_diameter_vendors.dpatch: removed, wrong.
* debian/ethereal-common.files: add capinfos.
* debian/ethereal-common.manpages: add capinfos man page.
* debian/changelog: fixed 0.6.3-2 header line since lintian now complains
about the old way of closing bugs from changelogs.
.
ethereal (0.10.12-3) unstable; urgency=low
.
* debian/patches/04_drop-capabilities.dpatch: don't exit on failure, simply
skip the capabilities part; use g_warning to output messages.
(closes: #321204)
.
ethereal (0.10.12-2) unstable; urgency=low
.
* debian/patches/04_drop-capabilities.dpatch: preserves CAP_DAC_READ_SEARCH
which seems necessary for sudo usage (closes: #320453)
.
ethereal (0.10.12-1) unstable; urgency=high
.
* New upstream release; urgency high since it fixes security issues in many
dissectors; see http://www.ethereal.com/appnotes/enpa-sa-00020.html
.
ethereal (0.10.11-5) unstable; urgency=low
.
* debian/patches/11_diameter_vendors.dpatch: correctly add diameter vendors
(patch by Joost Yervante Damad) (closes: #316082)
.
ethereal (0.10.11-4) unstable; urgency=low
.
* debian/: now using dpatch, started from Ubuntu patch, merged with current
package patches.
.
ethereal (0.10.11-3) unstable; urgency=low
.
* Modified capabilities patch so it doesn't try to keep CAP_NET_RAW if it
doesn't have it. (closes: #318689)
.
ethereal (0.10.11-2) unstable; urgency=low
.
* Use capabilities to mitigate security risk, patch from J.H.M. Dassen (Ray)
(closes: #315670)
* debian/control: build-depends on libcap-dev
* epan/dissectors/packet-cmip.c: fixed dissect_cmip_InvokeIDType declaration
mismatch.
.
ethereal (0.10.11-1) unstable; urgency=high
.
* New upstream release; urgency high since it fixes security issues in the
following dissectors:
* format string vulnerabilities: ANSI A, DHCP
* segmentation faults: GSM MAP, AIM, TZSP, Bittorrent, SMB, GSM, SMB
NETLOGON
* buffer overflows: DISTCC, FCELS, SIP, ISIS, CMIP, CMP, CMS, CRMF, ESS,
OCSP, PKIX1Explitit, PKIX Qualified, X.509, NCP, ISUP, TCAP,
Presentation
* null pointer exception: KINK, WSP, SMB Mailslot, H.245, MGCP, RPC
* infinite loops: LMP, EIGRP, MEGACO, L2TP
* uncaught assertions: Telnet, 802.3, BER, IAX2, RADIUS, SMB PIPE, MRDISC
* memory exhaustion: DICOM
* unclassified: Fibre Channel, LDAP, NTLMSSP
Files:
4534323ea73f9f85ba3704be04a7d7c1 1033 net optional wireshark_0.99.2-6~bpo.1.dsc
46d3b7c9766960fb34782c2078c50d13 12358081 net optional wireshark_0.99.2.orig.tar.gz
2f2643d2222822a2b69199dbf45e30ff 90429 net optional wireshark_0.99.2-6~bpo.1.diff.gz
660f047ef4bd6a227d9d41eafb7fa353 6844436 net optional wireshark-common_0.99.2-6~bpo.1_i386.deb
1ba1368988fef33499c964e9ef53b5f7 531082 net optional wireshark_0.99.2-6~bpo.1_i386.deb
a1bf74b9eeead79f0f607d806a2dbf60 97596 net optional tshark_0.99.2-6~bpo.1_i386.deb
9652a47185604e72126fa7513e42ec79 171802 devel optional wireshark-dev_0.99.2-6~bpo.1_i386.deb
57b48442c375bb768f7e568c71d92a0f 21196 net optional ethereal-common_0.99.2-6~bpo.1_i386.deb
1c0064c0172ed23fd5d7e781b43e5470 21194 devel optional ethereal-dev_0.99.2-6~bpo.1_i386.deb
83751f1f230d03c47cc677e228c31fa6 21180 net optional ethereal_0.99.2-6~bpo.1_i386.deb
89511fbc79cec03b1cbc04e940849585 21190 net optional tethereal_0.99.2-6~bpo.1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFDB+br/RnCw96jQERAjMvAKC22O2r5WLimNaj/kplrxrMFwZmBwCeORZm
cE12BSTweSfrPpBajZk5YO8=
=NeFs
-----END PGP SIGNATURE-----
Accepted:
ethereal-common_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/ethereal-common_0.99.2-6~bpo.1_i386.deb
ethereal-dev_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/ethereal-dev_0.99.2-6~bpo.1_i386.deb
ethereal_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/ethereal_0.99.2-6~bpo.1_i386.deb
tethereal_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/tethereal_0.99.2-6~bpo.1_i386.deb
tshark_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/tshark_0.99.2-6~bpo.1_i386.deb
wireshark-common_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/wireshark-common_0.99.2-6~bpo.1_i386.deb
wireshark-dev_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/wireshark-dev_0.99.2-6~bpo.1_i386.deb
wireshark_0.99.2-6~bpo.1.diff.gz
to pool/main/w/wireshark/wireshark_0.99.2-6~bpo.1.diff.gz
wireshark_0.99.2-6~bpo.1.dsc
to pool/main/w/wireshark/wireshark_0.99.2-6~bpo.1.dsc
wireshark_0.99.2-6~bpo.1_i386.deb
to pool/main/w/wireshark/wireshark_0.99.2-6~bpo.1_i386.deb
wireshark_0.99.2.orig.tar.gz
to pool/main/w/wireshark/wireshark_0.99.2.orig.tar.gz
Reply to: