*** This bug is a security vulnerability ***

Public security bug reported:

Upstream provides micro-releases on the 1.10.x branch to fix bugs and
security vulnerabilities.

Wireshark 1.10.14 Release Notes
https://www.wireshark.org/docs/relnotes/wireshark-1.10.14.html

The following vulnerabilities have been fixed.

    wnpa-sec-2015-14
    The WCP dissector could crash while decompressing data. (Bug 10978) 
CVE-2015-3811

    wnpa-sec-2015-15
    The X11 dissector could leak memory. (Bug 11088) CVE-2015-3812

    wnpa-sec-2015-17
    The IEEE 802.11 dissector could go into an infinite loop. (Bug 11110) 
CVE-2015-3814

The following bugs have been fixed:

    Wireshark crashes if "Update list of packets in real time" is disabled and 
a display filter is applied while capturing. (Bug 6217)
    Wireshark relative ISN set incorrectly if raw ISN set to 0. (Bug 10713)
    Buffer overrun in encryption code. (Bug 10849)
    ICMP Parameter Problem message contains Length of original datagram is 
treated as the total IPv4 length. (Bug 10991)
    ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. (Bug 10992)
    Interface Identifier incorrectly represented by Wireshark. (Bug 11053)
    Annoying popup when trying to capture on bonding devices on Linux. (Bug 
11058)
    CanOpen dissector fails on frames with RTR and 0 length. (Bug 11083)
    Typo in secp521r1 curve wrongly identified as sect521r1. (Bug 11106)
    packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn’t filter ENUM. (Bug 11120)
    Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". (Bug 
11141) 

New and Updated Features

 There are no new features in this release.

New Protocol Support

 There are no new protocols in this release.

Updated Protocol Support

 ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP,
MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL

New and Updated Capture File Support and Savvius OmniPeek Visual
Networks

** Affects: wireshark (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: trusty upgrade-software-version

** Information type changed from Public to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3811

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3812

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3814

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567407

Title:
  [SRU] Update to bugfix release 1.10.14 in Trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1567407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to