[ubuntu/natty] wireshark 1.4.5-1 (Accepted)

Ubuntu Installer archive at ubuntu.com
Tue Apr 19 13:08:56 UTC 2011


wireshark (1.4.5-1) unstable; urgency=high

  * New upstream release 1.4.5
    - release notes:
      http://www.wireshark.org/docs/relnotes/wireshark-1.4.5.html
    - security fixes
      - The X.509if dissector could crash. (No assigned CVE number)
      - Paul Makowski from SEI/CERT discovered that the DECT dissector could
        overflow a buffer. (No assigned CVE number)
  * update standards-version to 3.9.2
  * clarify in README.Debian that only root is able to capture packets in
    default installation (Closes: #621801)

Date: Tue,  19 Apr 2011 13:08:10 +0000
Changed-By: Micah Gersten <launchpad at micahscomputing.com>
Maintainer: Balint Reczey <balint at balintreczey.hu>
Origin: Debian/unstable
https://launchpad.net/ubuntu/natty/+source/wireshark/1.4.5-1
-------------- next part --------------
Origin: Debian/unstable
Format: 1.7
Date: Tue,  19 Apr 2011 13:08:10 +0000
Source: wireshark
Binary: wireshark-common, wireshark, tshark, wireshark-dev, wireshark-dbg, wireshark-doc, libwireshark0, libwsutil0, libwsutil-dev, libwireshark-data, libwireshark-dev, libwiretap0, libwiretap-dev
Architecture: source
Version: 1.4.5-1
Distribution: natty
Urgency: high
Maintainer: Balint Reczey <balint at balintreczey.hu>
Changed-By: Micah Gersten <launchpad at micahscomputing.com>
Description:
 wireshark  - network traffic analyzer - GTK+ version
Closes: 621801
Files:
 40097a4b59c83a68fa45d9b6b9de3557 1987 net optional wireshark_1.4.5-1.dsc
 1a50f95aa17e719d8cac7e02f95377b2 56632 net optional wireshark_1.4.5-1.debian.tar.gz
 d278e377a830024e7ee1f279d0a50035 20501797 net optional wireshark_1.4.5.orig.tar.bz2
Changes:
 wireshark (1.4.5-1) unstable; urgency=high
 .
   * New upstream release 1.4.5
     - release notes:
       http://www.wireshark.org/docs/relnotes/wireshark-1.4.5.html
     - security fixes
       - The X.509if dissector could crash. (No assigned CVE number)
       - Paul Makowski from SEI/CERT discovered that the DECT dissector could
         overflow a buffer. (No assigned CVE number)
   * update standards-version to 3.9.2
   * clarify in README.Debian that only root is able to capture packets in
     default installation (Closes: #621801)



More information about the Natty-changes mailing list