This bug was fixed in the package wireshark - 1.10.6-1
Sponsored for Alberto Jovito (thedemon007)

---------------
wireshark (1.10.6-1) unstable; urgency=high

  * New upstream release 1.10.6
    - release notes:
      https://wireshark.org/docs/relnotes/wireshark-1.10.6.html
    - security fixes:
      - The NFS dissector could crash. Discovered by Moshe Kaplan
        (CVE-2014-2281)
      - The M3UA dissector could crash. Discovered by Laurent Butti.
        (CVE-2014-2282)
      - The RLC dissector could crash. (CVE-2014-2283)
      - The MPEG file parser could overflow a buffer.
        Discovered by Wesley Neelen. (CVE-2014-2299)
  * Drop 10_allow-deprecated-gtk-functions.patch and
    11_fix-g_memmove-ftbfs-issues.patch since they are integrated upstream.
  * Generate symbols files
  * Ship wireshark.pc for pkg-config (Closes: #740716)

 -- Balint Reczey <bal...@balintreczey.hu>  Sat, 08 Mar 2014 18:26:41
+0100

** Changed in: wireshark (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: wireshark (Ubuntu Saucy)
   Importance: Undecided => High

** Changed in: wireshark (Ubuntu Precise)
   Importance: Undecided => High

** Changed in: wireshark (Ubuntu Quantal)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1290100

Title:
  [Need update to 1.10.6] 4 Vulnerabilities buffer overflow crash ddos

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1290100/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to