lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160702124013.GA16304@pisco.westfalen.local>
Date: Sat, 2 Jul 2016 14:40:13 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3615-1] wireshark security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3615-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 02, 2016                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2016-5350 CVE-2016-5351 CVE-2016-5353 CVE-2016-5354 
                 CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5359

Multiple vulnerabilities were discovered in the dissectors/parsers for
PKTC, IAX2, GSM CBCH and NCP, SPOOLS, IEEE 802.11, UMTS FP, USB,
Toshiba, CoSine, NetScreen, WBXML which could result in denial of service
or potentially the execution of arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u7.

For the testing distribution (stretch), these problems have been fixed
in version 2.0.4+gdd7746e-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.4+gdd7746e-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=mUNo
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ