This bug was fixed in the package wireshark - 1.10.6-1
Sponsored for Alberto Jovito (thedemon007)
---------------
wireshark (1.10.6-1) unstable; urgency=high
* New upstream release 1.10.6
- release notes:
https://wireshark.org/docs/relnotes/wireshark-1.10.6.html
- security fixes:
- The NFS dissector could crash. Discovered by Moshe Kaplan
(CVE-2014-2281)
- The M3UA dissector could crash. Discovered by Laurent Butti.
(CVE-2014-2282)
- The RLC dissector could crash. (CVE-2014-2283)
- The MPEG file parser could overflow a buffer.
Discovered by Wesley Neelen. (CVE-2014-2299)
* Drop 10_allow-deprecated-gtk-functions.patch and
11_fix-g_memmove-ftbfs-issues.patch since they are integrated upstream.
* Generate symbols files
* Ship wireshark.pc for pkg-config (Closes: #740716)
-- Balint Reczey <[email protected]> Sat, 08 Mar 2014 18:26:41
+0100
** Changed in: wireshark (Ubuntu Trusty)
Importance: Undecided => High
** Changed in: wireshark (Ubuntu Saucy)
Importance: Undecided => High
** Changed in: wireshark (Ubuntu Precise)
Importance: Undecided => High
** Changed in: wireshark (Ubuntu Quantal)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1290100
Title:
[Need update to 1.10.6] 4 Vulnerabilities buffer overflow crash ddos
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1290100/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs