As in NVD: Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability." Since we have net-analyzer/wireshark ~1.6.2 (and some old trees had 1.6.0-rc1), it is important to check before unmask it.
CVE-2011 3484 "The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet." http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3484 and CVE-2011 3482 "The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet." http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3482 apply to the same packages.
Fixed package is in the tree now (thanks, Peter). Closing noglsa since 1.6.x is ~arch.