This bug was fixed in the package wireshark - 1.10.6-1 Sponsored for Alberto Jovito (thedemon007)
--------------- wireshark (1.10.6-1) unstable; urgency=high * New upstream release 1.10.6 - release notes: https://wireshark.org/docs/relnotes/wireshark-1.10.6.html - security fixes: - The NFS dissector could crash. Discovered by Moshe Kaplan (CVE-2014-2281) - The M3UA dissector could crash. Discovered by Laurent Butti. (CVE-2014-2282) - The RLC dissector could crash. (CVE-2014-2283) - The MPEG file parser could overflow a buffer. Discovered by Wesley Neelen. (CVE-2014-2299) * Drop 10_allow-deprecated-gtk-functions.patch and 11_fix-g_memmove-ftbfs-issues.patch since they are integrated upstream. * Generate symbols files * Ship wireshark.pc for pkg-config (Closes: #740716) -- Balint Reczey <bal...@balintreczey.hu> Sat, 08 Mar 2014 18:26:41 +0100 ** Changed in: wireshark (Ubuntu Trusty) Importance: Undecided => High ** Changed in: wireshark (Ubuntu Saucy) Importance: Undecided => High ** Changed in: wireshark (Ubuntu Precise) Importance: Undecided => High ** Changed in: wireshark (Ubuntu Quantal) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1290100 Title: [Need update to 1.10.6] 4 Vulnerabilities buffer overflow crash ddos To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1290100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs