[ubuntu/maverick-security] wireshark_1.2.11-6+squeeze1build0.10.10.1_armel_translations.tar.gz, wireshark_1.2.11-6+squeeze1build0.10.10.1_i386_translations.tar.gz, wireshark_1.2.11-6+squeeze1build0.10.10.1_powerpc_translations.tar.gz (delayed), wireshark_1.2.11-6+squeeze1build0.10.10.1_amd64_translations.tar.gz, wireshark 1.2.11-6+squeeze1build0.10.10.1 (Accepted)

Ubuntu Installer archive at ubuntu.com
Mon Apr 11 13:03:59 UTC 2011


wireshark (1.2.11-6+squeeze1build0.10.10.1) maverick-security; urgency=low

  * fake sync from Debian

wireshark (1.2.11-6+squeeze1) stable-security; urgency=high

  * security fixes from Wireshark 1.2.15:
    - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
      that Wireshark could free an uninitialized pointer while reading a
      malformed pcap-ng file. (CVE-2011-0538) (Closes: #613202)
    - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
      that a large packet length in a pcap-ng file could crash Wireshark
    - Wireshark could overflow a buffer while reading a Nokia DCT3 trace file.
      (CVE-2011-0713)
    - joernchen of Phenoelit discovered that the LDAP and SMB dissectors
      could overflow the stack.
    - Xiaopeng Zhang of Fortinet's Fortiguard Labs discovered that large LDAP
      Filter strings can consume excessive amounts of memory.

Date: Fri, 08 Apr 2011 13:28:38 -0500
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Maintainer: Balint Reczey <balint at balintreczey.hu>
https://launchpad.net/ubuntu/maverick/+source/wireshark/1.2.11-6+squeeze1build0.10.10.1
-------------- next part --------------
Format: 1.8
Date: Fri, 08 Apr 2011 13:28:38 -0500
Source: wireshark
Binary: wireshark-common wireshark tshark wireshark-dev wireshark-dbg
Architecture: source
Version: 1.2.11-6+squeeze1build0.10.10.1
Distribution: maverick-security
Urgency: high
Maintainer: Balint Reczey <balint at balintreczey.hu>
Changed-By: Jamie Strandboge <jamie at ubuntu.com>
Description: 
 tshark     - network traffic analyzer - console version
 wireshark  - network traffic analyzer - GTK+ version
 wireshark-common - network traffic analyzer - common files
 wireshark-dbg - network traffic analyzer - debug symbols
 wireshark-dev - network traffic analyzer - development tools
Closes: 613202
Changes: 
 wireshark (1.2.11-6+squeeze1build0.10.10.1) maverick-security; urgency=low
 .
   * fake sync from Debian
 .
 wireshark (1.2.11-6+squeeze1) stable-security; urgency=high
 .
   * security fixes from Wireshark 1.2.15:
     - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
       that Wireshark could free an uninitialized pointer while reading a
       malformed pcap-ng file. (CVE-2011-0538) (Closes: #613202)
     - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
       that a large packet length in a pcap-ng file could crash Wireshark
     - Wireshark could overflow a buffer while reading a Nokia DCT3 trace file.
       (CVE-2011-0713)
     - joernchen of Phenoelit discovered that the LDAP and SMB dissectors
       could overflow the stack.
     - Xiaopeng Zhang of Fortinet's Fortiguard Labs discovered that large LDAP
       Filter strings can consume excessive amounts of memory.
Checksums-Sha1: 
 79f8c54e69e9fa08080a55762f3d05548e101852 2443 wireshark_1.2.11-6+squeeze1build0.10.10.1.dsc
 c4b3e3611f0d9368c4a581f43bcfdc3e08078cf2 69638 wireshark_1.2.11-6+squeeze1build0.10.10.1.debian.tar.gz
Checksums-Sha256: 
 7bd856e773ad2f48e60630c095bebc1cf208a4c3e91cc20a9424ecb8f78d60ae 2443 wireshark_1.2.11-6+squeeze1build0.10.10.1.dsc
 606fe4e37f629fa28e8eba3909c482ab3f25da509e622b0cf1effa9fb3a26aa1 69638 wireshark_1.2.11-6+squeeze1build0.10.10.1.debian.tar.gz
Files: 
 9793ce47b1b28b683fa0b06ec14cd53e 2443 net optional wireshark_1.2.11-6+squeeze1build0.10.10.1.dsc
 8f81ed0931ce2cc694e8c7bafe3a8942 69638 net optional wireshark_1.2.11-6+squeeze1build0.10.10.1.debian.tar.gz


More information about the Maverick-changes mailing list