lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20141014193543.GA3407@pisco.westfalen.local>
Date: Tue, 14 Oct 2014 21:35:43 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3049-1] wireshark security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3049-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
October 14, 2014                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2014-6422 CVE-2014-6423 CVE-2014-6424 CVE-2014-6427 
                 CVE-2014-6428 CVE-2014-6429 CVE-2014-6430 CVE-2014-6431
                 CVE-2014-6432

Multiple vulnerabilities were discovered in the dissectors/parsers for
RTP, MEGACO, Netflow, RTSP, SES and Sniffer, which could result in denial
of service.

For the stable distribution (wheezy), these problems have been fixed in
version 1.8.2-5wheezy12.

For the testing distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.12.1+g01b65bf-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=lfxw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ