|
![](/images/spacer.gif) |
![](/images/spacer.gif) |
![](/images/spacer.gif) |
Changelog for ethereal-0.10.9-2.i386.rpm :
Mon Jan 24 13:00:00 2005 PLD Team All persons listed below can be reached at AATTpld.org.pl
$Log: ethereal.spec,v $ Revision 1.103 2005/01/24 04:59:07 kloczek - release 2: rebuild on glibc 2.3.4.
Revision 1.102 2005/01/21 07:08:42 kloczek - updaed to 0.10.9.
Revision 1.101 2004/12/16 16:18:28 kloczek - updated to 0.10.8, - SECURITY FIXES: CAN-2004-1139: fixed bug in DICOM dissection that could make Ethereal crash. CAN-2004-1140: fixed an invalid RTP timestamp could make Ethereal hang and create a large temporary file, possibly filling available disk space. CAN-2004-1141: fixed the HTTP dissector could access previously-freed memory, causing a crash. CAN-2004-1142: fixed improperly formatted SMB packet which could make Ethereal hang, maximizing CPU utilization.
Revision 1.100 2004/11/11 18:32:19 kloczek - release 2, - rebuild on gcc 3.4.3, - add ia64-segfault patch stolen from FC: fix segfault on ia64.
Revision 1.99 2004/10/21 19:26:37 kloczek - capinfos added to tools subpackage.
Revision 1.98 2004/10/21 19:25:06 kloczek - updated to 0.10.7.
Revision 1.97 2004/08/20 20:53:21 kloczek - updated to 0.10.6.
Revision 1.96 2004/07/08 20:42:57 kloczek - updated to 0.10.5, - SECURITY FIXES: CAN-2004-0633: The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow. CAN-2004-0634: The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference. CAN-2004-0635: The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.
Revision 1.95 2004/05/14 15:56:42 kloczek - reverte last commit (commited on incorrect branch).
Revision 1.94 2004/05/14 15:48:59 kloczek - backporting fixes.
Revision 1.93 2004/05/14 15:43:37 kloczek - updated to 0.10.4, - SECURITY FIXES: http://www.ethereal.com/appnotes/enpa-sa-00014.html Issues have been discovered in the following protocol dissectors: * A SIP packet could make Ethereal crash under specific conditions, as described in the following message: http://www.ethereal.com/lists/ethereal-users/200405/msg00018.html (0.10.3). * The AIM dissector could throw an assertion, causing Ethereal to terminate abnormally (0.10.3). * It was possible for the SPNEGO dissector to dereference a null pointer, causing a crash (0.9.8 to 0.10.3). * The MMSE dissector was susceptible to a buffer overflow. (0.10.1 to 0.10.3). Impact: It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, by convincing someone to read a malformed packet trace file, or by creating a malformed color filter file.
Revision 1.92 2004/03/26 19:50:03 kloczek - updated to 0.10.3, - SECURITY FIXES: - CAN-2004-0176: buffer overflows in the following protocol dissectors: NetFlow, IGAP, EIGRP, PGM, IrDA, BGP, ISUP, and TCAP. - CAN-2004-0367: a zero-length Presentation protocol selector could make Ethereal crash, - CAN-2004-0365: a carefully-crafted RADIUS packet could cause a crash, - a corrupt color filter file could cause a segmentation fault. - added libs subpackage (common is now obsoleted).
Revision 1.91 2004/03/17 00:07:45 kloczek - unroll %{_pixmapsdir} macro and use directly %{_datadir}/pixmaps
Revision 1.90 2004/03/15 06:28:56 kloczek - use %{_datadir}/applications for store desktop files.
Revision 1.89 2004/02/24 17:50:44 kloczek - updated to 0.10.2, - enable SNMP and ipv6 support.
|
|
|