lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20150623202322.GA14902@pisco.westfalen.local>
Date: Tue, 23 Jun 2015 22:23:22 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3294-1] wireshark security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3294-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
June 23, 2015                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2015-4651 CVE-2015-4652

Multiple vulnerabilities were discovered in the dissectors for WCCP
and GSM DTAP, which could result in denial of service.

The oldstable distribution (wheezy) is not affected.

For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u2.

For the testing distribution (stretch), these problems have been fixed
in version 1.12.6+gee1fce6-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.12.6+gee1fce6-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0wI6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ