Branches for Hardy

Name Status Last Modified Last Commit
lp:ubuntu/hardy/wireshark 2 Mature 2009-07-26 17:21:38 UTC
21. * Several security issues were solved...

Author: Joost Yervante Damad
Revision Date: 2008-04-01 19:48:19 UTC

* Several security issues were solved in 0.99.7 already:
  (closes: #452381)
  * allow remote attackers to cause a denial of service (crash) via (1) a
    crafted MP3 file or (2) unspecified vectors to the NCP dissector
    (CVE-2007-6111)
  * Buffer overflow in the PPP dissector Wireshark (formerly Ethereal)
    0.99.6 allows remote attackers to cause a denial of service (crash)
    and possibly execute arbitrary code via unknown vectors.
    (CVE-2007-6112)
  * Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote
    attackers to cause a denial of service (long loop) via a malformed DNP
    packet (CVE-2007-6113)
  * Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0
    through 0.99.6 allow remote attackers to cause a denial of service
    (crash) and possibly execute arbitrary code via (1) the SSL dissector
    or (2) the iSeries (OS/400) Communication trace file parser
    (CVE-2007-6114)
  * Buffer overflow in the ANSI MAP dissector for Wireshark (formerly
    Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms,
    allows remote attackers to cause a denial of service and possibly
    execute arbitrary code via unknown vectors. (CVE-2007-6115)
  * The Firebird/Interbase dissector in Wireshark (formerly Ethereal)
    0.99.6 allows remote attackers to cause a denial of service (infinite
    loop or crash) via unknown vectors. (CVE-2007-6116)
  * Unspecified vulnerability in the HTTP dissector for Wireshark
    (formerly Ethereal) 0.10.14 to 0.99.6 has unknown impact and remote
    attack vectors related to chunked messages. (CVE-2007-6117)
  * The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6
    allows remote attackers to cause a denial of service (long loop and
    resource consumption) via unknown vectors. (CVE-2007-6118)
  * The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows
    remote attackers to cause a denial of service (long loop and resource
    consumption) via unknown vectors. (CVE-2007-6119)
  * The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to
    0.99.6 allows remote attackers to cause a denial of service (infinite
    loop) via unknown vectors. (CVE-2007-6120)
  * Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers
    to cause a denial of service (crash) via a malformed RPC Portmap
    packet. (CVE-2007-6121)
* current wireshark has SSL support (closes: #172939)
* and H323 support (closes: #117201)
* resizing columns bugfix was applied last year (closes: #369044)
* new upstream release 1.0.0
  http://www.wireshark.org/docs/relnotes/wireshark-1.0.0.html
* remove debian/ directory from upstream
* update 14_disable-cmip.dpatch.
* if wireshark has no priv, it now prints:
    dumpcap: There are no interfaces on which a capture can be done
    (closes: #468400)
* wireshark uses su-to-root now (closes: #472478)
* vulnerabilities fixed:
  * The X.509sat and other dissector could crash (CVE-2008-1561)
  * The LDAP dissector could crash on Windows and other platforms.
    (CVE-2008-1562)
  * The SCCP dissector could crash while using the "decode as"
    feature (CVE-2008-1563)

lp:ubuntu/hardy-backports/wireshark 2 Mature 2009-07-26 17:22:16 UTC
22. Automated backport upload; no source ...

Author: Scott Kitterman
Revision Date: 2008-08-21 02:34:20 UTC

Automated backport upload; no source changes.

lp:ubuntu/hardy-proposed/wireshark 2 Mature 2009-07-26 17:21:56 UTC
22. * SECURITY UPDATE: packet-usb.c in t...

Author: Stefan Lesicnik
Revision Date: 2008-10-30 13:17:54 UTC

 * SECURITY UPDATE: packet-usb.c in the USB dissector in Wireshark 0.99.7
  through 1.0.3 allows remote attackers to cause a denial of service
  (application crash or abort) via a malformed USB Request Block (URB).
  (LP #290716)
  - debian/patches/30_CVE-2008-4680.dpatch - Properly initialise
    data structures in packet-usb.c - Gerald Combs.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26333
  - CVE-2008-4680
* SECURITY UPDATE: Unspecified vulnerability in the Bluetooth RFCOMM
  dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers
  to cause a denial of service (application crash or abort) via unknown
  packets. (LP #290716)
  - debian/patches/31_CVE-2008-4681.dpatch - Properly initialise
    data structures in btrfcomm.c - Gerald Combs.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26333
  - CVE-2008-4681
* SECURITY UPDATE: wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote
  attackers to cause a denial of service (application abort) via a
  malformed Tamos CommView capture file (aka .ncf file) with an
  "unknown/unexpected packet type" that triggers a failed assertion.
  (LP #290716)
  - debian/patches/32_CVE-2008-4682.dpatch - Return an error if it
    finds an unknown/unexpected packet type - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26327
  - CVE-2008-4682
* SECURITY UPDATE: The dissect_btacl function in packet-bthci_acl.c in the
  Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote
  attackers to cause a denial of service (application crash or abort) via
  a packet with an invalid length, related to an erroneous tvb_memcpy call.
  (LP #290716)
  - debian/patches/33_CVE-2008-4683.dpatch - buffer check to prevent
    overflow - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25195
  - Included patch not listed by CVE to prevent memory overflow in
    bluetooth dissector - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25196
  - CVE-2008-4683
* SECURITY UPDATE: packet-frame in Wireshark 0.99.2 through 1.0.3 does not
  properly handle exceptions thrown by post dissectors, which allows
  remote attackers to cause a denial of service (application crash) via
  a certain series of packets, as demonstrated by enabling the (1) PRP
  or (2) MATE post dissector. (LP #290716)
  - debian/patches/34_CVE-2008-4684.dpatch - Catch errors given
    post dissectors - Jeff Morris, wmeier
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25339, 25342, 25344
  - CVE-2008-4684
* SECURITY UPDATE: Use-after-free vulnerability in the dissect_q931_cause_ie
  function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through
  1.0.3 allows remote attackers to cause a denial of service (application crash
  or abort) via certain packets that trigger an exception. (LP #290716)
  - debian/patches/35_CVE-2008-4685.dpatch - Wrap dissect_q931_cause_ie() in
    which clears the have_valid_q931_pi semaphore - Jaap Keuter.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26190
  - CVE-2008-4685

lp:ubuntu/hardy-security/wireshark 2 Mature 2009-07-26 17:21:47 UTC
22. * SECURITY UPDATE: packet-usb.c in t...

Author: Stefan Lesicnik
Revision Date: 2008-10-30 13:17:54 UTC

 * SECURITY UPDATE: packet-usb.c in the USB dissector in Wireshark 0.99.7
  through 1.0.3 allows remote attackers to cause a denial of service
  (application crash or abort) via a malformed USB Request Block (URB).
  (LP #290716)
  - debian/patches/30_CVE-2008-4680.dpatch - Properly initialise
    data structures in packet-usb.c - Gerald Combs.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26333
  - CVE-2008-4680
* SECURITY UPDATE: Unspecified vulnerability in the Bluetooth RFCOMM
  dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers
  to cause a denial of service (application crash or abort) via unknown
  packets. (LP #290716)
  - debian/patches/31_CVE-2008-4681.dpatch - Properly initialise
    data structures in btrfcomm.c - Gerald Combs.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26333
  - CVE-2008-4681
* SECURITY UPDATE: wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote
  attackers to cause a denial of service (application abort) via a
  malformed Tamos CommView capture file (aka .ncf file) with an
  "unknown/unexpected packet type" that triggers a failed assertion.
  (LP #290716)
  - debian/patches/32_CVE-2008-4682.dpatch - Return an error if it
    finds an unknown/unexpected packet type - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26327
  - CVE-2008-4682
* SECURITY UPDATE: The dissect_btacl function in packet-bthci_acl.c in the
  Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote
  attackers to cause a denial of service (application crash or abort) via
  a packet with an invalid length, related to an erroneous tvb_memcpy call.
  (LP #290716)
  - debian/patches/33_CVE-2008-4683.dpatch - buffer check to prevent
    overflow - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25195
  - Included patch not listed by CVE to prevent memory overflow in
    bluetooth dissector - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25196
  - CVE-2008-4683
* SECURITY UPDATE: packet-frame in Wireshark 0.99.2 through 1.0.3 does not
  properly handle exceptions thrown by post dissectors, which allows
  remote attackers to cause a denial of service (application crash) via
  a certain series of packets, as demonstrated by enabling the (1) PRP
  or (2) MATE post dissector. (LP #290716)
  - debian/patches/34_CVE-2008-4684.dpatch - Catch errors given
    post dissectors - Jeff Morris, wmeier
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25339, 25342, 25344
  - CVE-2008-4684
* SECURITY UPDATE: Use-after-free vulnerability in the dissect_q931_cause_ie
  function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through
  1.0.3 allows remote attackers to cause a denial of service (application crash
  or abort) via certain packets that trigger an exception. (LP #290716)
  - debian/patches/35_CVE-2008-4685.dpatch - Wrap dissect_q931_cause_ie() in
    which clears the have_valid_q931_pi semaphore - Jaap Keuter.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26190
  - CVE-2008-4685

lp:ubuntu/hardy-updates/wireshark 2 Mature 2009-07-26 17:22:06 UTC
22. * SECURITY UPDATE: packet-usb.c in t...

Author: Stefan Lesicnik
Revision Date: 2008-10-30 13:17:54 UTC

 * SECURITY UPDATE: packet-usb.c in the USB dissector in Wireshark 0.99.7
  through 1.0.3 allows remote attackers to cause a denial of service
  (application crash or abort) via a malformed USB Request Block (URB).
  (LP #290716)
  - debian/patches/30_CVE-2008-4680.dpatch - Properly initialise
    data structures in packet-usb.c - Gerald Combs.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26333
  - CVE-2008-4680
* SECURITY UPDATE: Unspecified vulnerability in the Bluetooth RFCOMM
  dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers
  to cause a denial of service (application crash or abort) via unknown
  packets. (LP #290716)
  - debian/patches/31_CVE-2008-4681.dpatch - Properly initialise
    data structures in btrfcomm.c - Gerald Combs.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26333
  - CVE-2008-4681
* SECURITY UPDATE: wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote
  attackers to cause a denial of service (application abort) via a
  malformed Tamos CommView capture file (aka .ncf file) with an
  "unknown/unexpected packet type" that triggers a failed assertion.
  (LP #290716)
  - debian/patches/32_CVE-2008-4682.dpatch - Return an error if it
    finds an unknown/unexpected packet type - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26327
  - CVE-2008-4682
* SECURITY UPDATE: The dissect_btacl function in packet-bthci_acl.c in the
  Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote
  attackers to cause a denial of service (application crash or abort) via
  a packet with an invalid length, related to an erroneous tvb_memcpy call.
  (LP #290716)
  - debian/patches/33_CVE-2008-4683.dpatch - buffer check to prevent
    overflow - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25195
  - Included patch not listed by CVE to prevent memory overflow in
    bluetooth dissector - Jeff Morris.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25196
  - CVE-2008-4683
* SECURITY UPDATE: packet-frame in Wireshark 0.99.2 through 1.0.3 does not
  properly handle exceptions thrown by post dissectors, which allows
  remote attackers to cause a denial of service (application crash) via
  a certain series of packets, as demonstrated by enabling the (1) PRP
  or (2) MATE post dissector. (LP #290716)
  - debian/patches/34_CVE-2008-4684.dpatch - Catch errors given
    post dissectors - Jeff Morris, wmeier
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 25339, 25342, 25344
  - CVE-2008-4684
* SECURITY UPDATE: Use-after-free vulnerability in the dissect_q931_cause_ie
  function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through
  1.0.3 allows remote attackers to cause a denial of service (application crash
  or abort) via certain packets that trigger an exception. (LP #290716)
  - debian/patches/35_CVE-2008-4685.dpatch - Wrap dissect_q931_cause_ie() in
    which clears the have_valid_q931_pi semaphore - Jaap Keuter.
  - Cherrypicked from http://anonsvn.wireshark.org/wireshark/trunk
  - Revision: 26190
  - CVE-2008-4685

15 of 5 results