** Description changed:

  Upstream provides micro-releases on the 1.10.x branch to fix bugs and
  security vulnerabilities.
  
+ 1.10.14 News
+ 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob;f=NEWS;h=f4ef7e33edabafe2b1c36ba4f2a965018bb4536c;hb=refs/heads/master-1.10
+ -----------------------------------------------------------
+ 
  Wireshark 1.10.14 Release Notes
- https://www.wireshark.org/docs/relnotes/wireshark-1.10.14.html
  
- The following vulnerabilities have been fixed.
+ Bug Fixes
  
-     wnpa-sec-2015-14
-     The WCP dissector could crash while decompressing data. (Bug 10978) 
CVE-2015-3811
+    The following vulnerabilities have been fixed.
+      * [1]wnpa-sec-2015-14
+        The WCP dissector could crash while decompressing data. ([2]Bug
+        10978) [3]CVE-2015-3811
+      * [4]wnpa-sec-2015-15
+        The X11 dissector could leak memory. ([5]Bug 11088)
+        [6]CVE-2015-3812
+      * [7]wnpa-sec-2015-17
+        The IEEE 802.11 dissector could go into an infinite loop. ([8]Bug
+        11110) [9]CVE-2015-3814
  
-     wnpa-sec-2015-15
-     The X11 dissector could leak memory. (Bug 11088) CVE-2015-3812
+    The following bugs have been fixed:
+      * Wireshark crashes if "Update list of packets in real time" is
+        disabled and a display filter is applied while capturing. ([10]Bug
+        6217)
+      * Wireshark relative ISN set incorrectly if raw ISN set to 0.
+        ([11]Bug 10713)
+      * Buffer overrun in encryption code. ([12]Bug 10849)
+      * ICMP Parameter Problem message contains Length of original datagram
+        is treated as the total IPv4 length. ([13]Bug 10991)
+      * ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. ([14]Bug
+        10992)
+      * Interface Identifier incorrectly represented by Wireshark. ([15]Bug
+        11053)
+      * Annoying popup when trying to capture on bonding devices on Linux.
+        ([16]Bug 11058)
+      * CanOpen dissector fails on frames with RTR and 0 length. ([17]Bug
+        11083)
+      * Typo in secp521r1 curve wrongly identified as sect521r1. ([18]Bug
+        11106)
+      * packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn't filter ENUM. ([19]Bug
+        11120)
+      * Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP".
+        ([20]Bug 11141)
  
-     wnpa-sec-2015-17
-     The IEEE 802.11 dissector could go into an infinite loop. (Bug 11110) 
CVE-2015-3814
+   New and Updated Features
  
- The following bugs have been fixed:
+    There are no new features in this release.
  
-     Wireshark crashes if "Update list of packets in real time" is disabled 
and a display filter is applied while capturing. (Bug 6217)
-     Wireshark relative ISN set incorrectly if raw ISN set to 0. (Bug 10713)
-     Buffer overrun in encryption code. (Bug 10849)
-     ICMP Parameter Problem message contains Length of original datagram is 
treated as the total IPv4 length. (Bug 10991)
-     ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. (Bug 10992)
-     Interface Identifier incorrectly represented by Wireshark. (Bug 11053)
-     Annoying popup when trying to capture on bonding devices on Linux. (Bug 
11058)
-     CanOpen dissector fails on frames with RTR and 0 length. (Bug 11083)
-     Typo in secp521r1 curve wrongly identified as sect521r1. (Bug 11106)
-     packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn’t filter ENUM. (Bug 11120)
-     Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". (Bug 
11141) 
+   New Protocol Support
  
- New and Updated Features
+    There are no new protocols in this release.
  
-  There are no new features in this release.
+   Updated Protocol Support
  
- New Protocol Support
+    ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP,
+    MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL
  
-  There are no new protocols in this release.
+   New and Updated Capture File Support
  
- Updated Protocol Support
+    and Savvius OmniPeek Visual Networks
+ ---------------------------------------------------------------------
  
-  ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP,
- MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL
+ Wireshark 1.10.13 Release Notes
  
- New and Updated Capture File Support and Savvius OmniPeek Visual
- Networks
+ Bug Fixes
+ 
+    The following vulnerabilities have been fixed.
+      * [1]wnpa-sec-2015-07
+        The WCP dissector could crash. ([2]Bug 10844) [3]CVE-2015-2188
+      * [4]wnpa-sec-2015-08
+        The pcapng file parser could crash. ([5]Bug 10895) [6]CVE-2015-2189
+      * [7]wnpa-sec-2015-10
+        The TNEF dissector could go into an infinite loop. Discovered by
+        Vlad Tsyrklevich. ([8]Bug 11023) [9]CVE-2015-2190
+ 
+    The following bugs have been fixed:
+      * IPv6 AUTH mobility option parses Mobility SPI and Authentication
+        Data incorrectly. ([10]Bug 10626)
+      * DHCP Option 125 Suboption: (1) option-len always expects 1 but
+        specification allows for more. ([11]Bug 10784)
+      * Little-endian OS X Bluetooth PacketLogger files aren't handled.
+        ([12]Bug 10861)
+      * X.509 certificate serial number incorrectly interpreted as negative
+        number. ([13]Bug 10862)
+      * H.248 "ServiceChangeReasonStr" messages are not shown in text
+        generated by tshark. ([14]Bug 10879)
+      * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI.
+        ([15]Bug 10897)
+      * MEGACO wrong decoding on media port. ([16]Bug 10898)
+      * Wrong media format. ([17]Bug 10899)
+      * BSSGP Status PDU decoding fault (missing Mandatory element (0x04)
+        BVCI for proper packet). ([18]Bug 10903)
+      * Packets on OpenBSD loopback decoded as raw not null. ([19]Bug
+        10956)
+      * Display Filter Macro unable to edit. ([20]Bug 10957)
+      * IPv6 Local Mobility Anchor Address mobility option code is treated
+        incorrectly. ([21]Bug 10961)
+      * Juniper Packet Mirror dissector expects ipv6 flow label = 0.
+        ([22]Bug 10976)
+      * Infinite loop DoS in TNEF dissector. ([23]Bug 11023)
+ 
+   New and Updated Features
+ 
+    There are no new features in this release.
+ 
+   New Protocol Support
+ 
+    There are no new protocols in this release.
+ 
+   Updated Protocol Support
+ 
+    ANSI IS-637-A, DHCP, GSM MAP, H.248, IPv6, Juniper Jmirror, and
+ X.509AF
+ 
+   New and Updated Capture File Support
+ 
+    PacketLogger, and Pcapng
+ ---------------------------------------------------------------------
+ 
+ Wireshark 1.10.12 Release Notes
+ 
+ Bug Fixes
+ 
+    The following vulnerabilities have been fixed.
+      * [1]wnpa-sec-2015-03
+        The DEC DNA Routing Protocol dissector could crash. ([2]Bug 10724)
+        [3]CVE-2015-0562
+      * [4]wnpa-sec-2015-04
+        The SMTP dissector could crash. ([5]Bug 10823) [6]CVE-2015-0563
+      * [7]wnpa-sec-2015-05
+        Wireshark could crash while decypting TLS/SSL sessions. Discovered
+        by Noam Rathaus. [8]CVE-2015-0564
+ 
+    The following bugs have been fixed:
+      * WebSocket dissector: empty payload causes
+        DISSECTOR_ASSERT_NOT_REACHED. ([9]Bug 9332)
+      * SMTP decoder can dump binary data to terminal in TShark. ([10]Bug
+        10536)
+      * IPv6 Vendor Specific Mobility Option includes the next mobility
+        option type. ([11]Bug 10618)
+      * Save PCAP to PCAPng with commentary fails. ([12]Bug 10656)
+      * Multipath TCP: checksum displayed when it's not there. ([13]Bug
+        10692)
+      * LTE APN-AMBR is decoded incorrectly. ([14]Bug 10699)
+      * IPv6 Experimental mobility header data is interpreted as options.
+        ([15]Bug 10703)
+      * Buildbot crash output: fuzz-2014-11-15-7777.pcap. ([16]Bug 10710)
+      * Buildbot crash output: fuzz-2014-11-18-30809.pcap. ([17]Bug 10716)
+      * Buildbot crash output: fuzz-2014-11-22-10244.pcap. ([18]Bug 10724)
+      * Decoding of longitude value in LCSAP (3GPP TS 29.171) is incorrect.
+        ([19]Bug 10767)
+      * Crash when enabling FCoIB manual settings without filling address
+        field. ([20]Bug 10796)
+      * RSVP RECORD_ROUTE IPv4 Subobject Flags field incorrect decoding.
+        ([21]Bug 10799)
+      * Wireshark Lua engine can't access protocol field type. ([22]Bug
+        10801)
+      * Lua: getting fieldinfo.value for FT_NONE causes assert. ([23]Bug
+        10815)
+      * Buildbot crash output: fuzz-2015-01-01-29029.pcap. ([24]Bug 10823)
+ 
+   New and Updated Features
+ 
+    There are no new features in this release.
+ 
+   New Protocol Support
+ 
+    There are no new protocols in this release.
+ 
+   Updated Protocol Support
+ 
+    DEC DNA, DECT, FCoIB, Infiniband, IrDA, LCSAP, MIPv6, NAS EPS, RDM,
+    RSVP, and TCP
+ 
+   New and Updated Capture File Support
+ ----------------------------------------------------------------------

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2188

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2189

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2190

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-0562

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-0563

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-0564

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1567407

Title:
  [SRU] Update to bugfix release 1.10.14 in Trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1567407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to