lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 28 Jan 2018 16:55:47 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4101-1] wireshark security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4101-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 28, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-5334 CVE-2018-5335 CVE-2018-5336

It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors/file parsers for IxVeriWave,
WCP, JSON, XML, NTP, XMPP and GDB, which could result in denial of
dervice or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version (1.12.1+g01b65bf-4+deb8u13.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u2.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=WA4T
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ