Your message dated Tue, 5 Sep 2006 11:51:39 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Fixed in NMU of wireshark 0.99.2-5.1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wireshark
Version: 0.99.2-5
Severity: critical
Tags: security
Justification: root security hole

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- From <http://www.wireshark.org/security/wnpa-sec-2006-02.html>:

Wireshark 0.99.3 fixes the following vulnerabilities:

    * The SCSI dissector could crash.
          Versions affected: 0.99.2. CVE: CVE-2006-4330
    * If Wireshark was compiled with ESP decryption support, the IPsec
          ESP preference parser was susceptible to off-by-one errors. Versions
          affected: 0.99.2. CVE: CVE-2006-4331
    * The DHCP dissector (and possibly others) in the Windows version of
          Wireshark could trigger a bug in Glib and crash.
          Versions affected: 0.10.13 - 0.99.2. CVE: CVE-2006-4332
    * If the SSCOP dissector has a port range configured and the SSCOP
          payload protocol is Q.2931, a malformed packet could make the Q.2931
          dissector use up available memory. No port range is configured by
          default. Versions affected: 0.7.9 - 0.99.2. CVE: CVE-2006-4333 

 It may be possible to make Wireshark or Ethereal crash, use up available
 memory, or run arbitrary code by injecting a purposefully malformed packet
 onto the wire or by convincing someone to read a malformed packet trace
 file.

- -- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-k7
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages wireshark depends on:
ii  libadns1                     1.1-4       Asynchronous-capable DNS client li
ii  libatk1.0-0                  1.12.1-1    The ATK accessibility toolkit
ii  libc6                        2.3.6-15    GNU C Library: Shared libraries
ii  libcairo2                    1.2.4-1     The Cairo 2D vector graphics libra
ii  libcap1                      1:1.10-14   support for getting/setting POSIX.
ii  libcomerr2                   1.39-1      common error description library
ii  libfontconfig1               2.3.2-7     generic font configuration library
ii  libglib2.0-0                 2.12.2-1    The GLib library of C routines
ii  libgnutls13                  1.4.2-1     the GNU TLS library - runtime libr
ii  libgtk2.0-0                  2.8.20-1    The GTK+ graphical user interface 
ii  libkrb53                     1.4.3-9     MIT Kerberos runtime libraries
ii  libpango1.0-0                1.12.3-1+b1 Layout and rendering of internatio
ii  libpcap0.8                   0.9.4-2     System interface for user-level pa
ii  libpcre3                     6.4-2       Perl 5 Compatible Regular Expressi
ii  libx11-6                     2:1.0.0-8   X11 client-side library
ii  libxcursor1                  1.1.5.2-5   X cursor management library
ii  libxext6                     1:1.0.0-4   X11 miscellaneous extension librar
ii  libxfixes3                   1:3.0.1.2-4 X11 miscellaneous 'fixes' extensio
ii  libxi6                       1:1.0.0-5   X11 Input extension library
ii  libxinerama1                 1:1.0.1-4   X11 Xinerama extension library
ii  libxrandr2                   2:1.1.0.2-4 X11 RandR extension library
ii  libxrender1                  1:0.9.0.2-4 X Rendering Extension client libra
ii  wireshark-common             0.99.2-5    network traffic analyser (common f
ii  zlib1g                       1:1.2.3-13  compression library - runtime

Versions of packages wireshark recommends:
ii  gksu                          1.9.2-1    graphical frontend to su

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE7hgxshl/216gEHgRAu53AJ9mdfcbd4gDSg+ce54B48jH4ASXtQCeMKOO
RkEzJd3JY+tHSy1EgOZPIJg=
=we6s
-----END PGP SIGNATURE-----


--- End Message ---
--- Begin Message ---
Version: 0.99.2-5.1

I've NMUed for this bug (fixing the bug to use versioning instead of the
"fixed" tag, to ease tracking through testing); here's the changelog:

>  wireshark (0.99.2-5.1) unstable; urgency=medium
>  .
>    * Non-maintainer upload.
>    * Backport security fixes from 0.99.3a (via Subversion); fixes
>      CVE-2006-4331, CVE-2006-4333 (CVE-2006-4330 was fixed in last upload,
>      and CVE-2006-4332 is not relevant for Debian). (Closes: #384529)

/* Steinar */
-- 
Homepage: http://www.sesse.net/

--- End Message ---

Reply via email to