[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160702124013.GA16304@pisco.westfalen.local>
Date: Sat, 2 Jul 2016 14:40:13 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3615-1] wireshark security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3615-1 security@...ian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 02, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : wireshark
CVE ID : CVE-2016-5350 CVE-2016-5351 CVE-2016-5353 CVE-2016-5354
CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5359
Multiple vulnerabilities were discovered in the dissectors/parsers for
PKTC, IAX2, GSM CBCH and NCP, SPOOLS, IEEE 802.11, UMTS FP, USB,
Toshiba, CoSine, NetScreen, WBXML which could result in denial of service
or potentially the execution of arbitrary code.
For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u7.
For the testing distribution (stretch), these problems have been fixed
in version 2.0.4+gdd7746e-1.
For the unstable distribution (sid), these problems have been fixed in
version 2.0.4+gdd7746e-1.
We recommend that you upgrade your wireshark packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=mUNo
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists