** Description changed: Upstream provides micro-releases on the 1.10.x branch to fix bugs and security vulnerabilities. + 1.10.14 News + https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob;f=NEWS;h=f4ef7e33edabafe2b1c36ba4f2a965018bb4536c;hb=refs/heads/master-1.10 + ----------------------------------------------------------- + Wireshark 1.10.14 Release Notes - https://www.wireshark.org/docs/relnotes/wireshark-1.10.14.html - The following vulnerabilities have been fixed. + Bug Fixes - wnpa-sec-2015-14 - The WCP dissector could crash while decompressing data. (Bug 10978) CVE-2015-3811 + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-14 + The WCP dissector could crash while decompressing data. ([2]Bug + 10978) [3]CVE-2015-3811 + * [4]wnpa-sec-2015-15 + The X11 dissector could leak memory. ([5]Bug 11088) + [6]CVE-2015-3812 + * [7]wnpa-sec-2015-17 + The IEEE 802.11 dissector could go into an infinite loop. ([8]Bug + 11110) [9]CVE-2015-3814 - wnpa-sec-2015-15 - The X11 dissector could leak memory. (Bug 11088) CVE-2015-3812 + The following bugs have been fixed: + * Wireshark crashes if "Update list of packets in real time" is + disabled and a display filter is applied while capturing. ([10]Bug + 6217) + * Wireshark relative ISN set incorrectly if raw ISN set to 0. + ([11]Bug 10713) + * Buffer overrun in encryption code. ([12]Bug 10849) + * ICMP Parameter Problem message contains Length of original datagram + is treated as the total IPv4 length. ([13]Bug 10991) + * ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. ([14]Bug + 10992) + * Interface Identifier incorrectly represented by Wireshark. ([15]Bug + 11053) + * Annoying popup when trying to capture on bonding devices on Linux. + ([16]Bug 11058) + * CanOpen dissector fails on frames with RTR and 0 length. ([17]Bug + 11083) + * Typo in secp521r1 curve wrongly identified as sect521r1. ([18]Bug + 11106) + * packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn't filter ENUM. ([19]Bug + 11120) + * Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". + ([20]Bug 11141) - wnpa-sec-2015-17 - The IEEE 802.11 dissector could go into an infinite loop. (Bug 11110) CVE-2015-3814 + New and Updated Features - The following bugs have been fixed: + There are no new features in this release. - Wireshark crashes if "Update list of packets in real time" is disabled and a display filter is applied while capturing. (Bug 6217) - Wireshark relative ISN set incorrectly if raw ISN set to 0. (Bug 10713) - Buffer overrun in encryption code. (Bug 10849) - ICMP Parameter Problem message contains Length of original datagram is treated as the total IPv4 length. (Bug 10991) - ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. (Bug 10992) - Interface Identifier incorrectly represented by Wireshark. (Bug 11053) - Annoying popup when trying to capture on bonding devices on Linux. (Bug 11058) - CanOpen dissector fails on frames with RTR and 0 length. (Bug 11083) - Typo in secp521r1 curve wrongly identified as sect521r1. (Bug 11106) - packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn’t filter ENUM. (Bug 11120) - Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". (Bug 11141) + New Protocol Support - New and Updated Features + There are no new protocols in this release. - There are no new features in this release. + Updated Protocol Support - New Protocol Support + ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP, + MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL - There are no new protocols in this release. + New and Updated Capture File Support - Updated Protocol Support + and Savvius OmniPeek Visual Networks + --------------------------------------------------------------------- - ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP, - MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL + Wireshark 1.10.13 Release Notes - New and Updated Capture File Support and Savvius OmniPeek Visual - Networks + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-07 + The WCP dissector could crash. ([2]Bug 10844) [3]CVE-2015-2188 + * [4]wnpa-sec-2015-08 + The pcapng file parser could crash. ([5]Bug 10895) [6]CVE-2015-2189 + * [7]wnpa-sec-2015-10 + The TNEF dissector could go into an infinite loop. Discovered by + Vlad Tsyrklevich. ([8]Bug 11023) [9]CVE-2015-2190 + + The following bugs have been fixed: + * IPv6 AUTH mobility option parses Mobility SPI and Authentication + Data incorrectly. ([10]Bug 10626) + * DHCP Option 125 Suboption: (1) option-len always expects 1 but + specification allows for more. ([11]Bug 10784) + * Little-endian OS X Bluetooth PacketLogger files aren't handled. + ([12]Bug 10861) + * X.509 certificate serial number incorrectly interpreted as negative + number. ([13]Bug 10862) + * H.248 "ServiceChangeReasonStr" messages are not shown in text + generated by tshark. ([14]Bug 10879) + * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI. + ([15]Bug 10897) + * MEGACO wrong decoding on media port. ([16]Bug 10898) + * Wrong media format. ([17]Bug 10899) + * BSSGP Status PDU decoding fault (missing Mandatory element (0x04) + BVCI for proper packet). ([18]Bug 10903) + * Packets on OpenBSD loopback decoded as raw not null. ([19]Bug + 10956) + * Display Filter Macro unable to edit. ([20]Bug 10957) + * IPv6 Local Mobility Anchor Address mobility option code is treated + incorrectly. ([21]Bug 10961) + * Juniper Packet Mirror dissector expects ipv6 flow label = 0. + ([22]Bug 10976) + * Infinite loop DoS in TNEF dissector. ([23]Bug 11023) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + ANSI IS-637-A, DHCP, GSM MAP, H.248, IPv6, Juniper Jmirror, and + X.509AF + + New and Updated Capture File Support + + PacketLogger, and Pcapng + --------------------------------------------------------------------- + + Wireshark 1.10.12 Release Notes + + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-03 + The DEC DNA Routing Protocol dissector could crash. ([2]Bug 10724) + [3]CVE-2015-0562 + * [4]wnpa-sec-2015-04 + The SMTP dissector could crash. ([5]Bug 10823) [6]CVE-2015-0563 + * [7]wnpa-sec-2015-05 + Wireshark could crash while decypting TLS/SSL sessions. Discovered + by Noam Rathaus. [8]CVE-2015-0564 + + The following bugs have been fixed: + * WebSocket dissector: empty payload causes + DISSECTOR_ASSERT_NOT_REACHED. ([9]Bug 9332) + * SMTP decoder can dump binary data to terminal in TShark. ([10]Bug + 10536) + * IPv6 Vendor Specific Mobility Option includes the next mobility + option type. ([11]Bug 10618) + * Save PCAP to PCAPng with commentary fails. ([12]Bug 10656) + * Multipath TCP: checksum displayed when it's not there. ([13]Bug + 10692) + * LTE APN-AMBR is decoded incorrectly. ([14]Bug 10699) + * IPv6 Experimental mobility header data is interpreted as options. + ([15]Bug 10703) + * Buildbot crash output: fuzz-2014-11-15-7777.pcap. ([16]Bug 10710) + * Buildbot crash output: fuzz-2014-11-18-30809.pcap. ([17]Bug 10716) + * Buildbot crash output: fuzz-2014-11-22-10244.pcap. ([18]Bug 10724) + * Decoding of longitude value in LCSAP (3GPP TS 29.171) is incorrect. + ([19]Bug 10767) + * Crash when enabling FCoIB manual settings without filling address + field. ([20]Bug 10796) + * RSVP RECORD_ROUTE IPv4 Subobject Flags field incorrect decoding. + ([21]Bug 10799) + * Wireshark Lua engine can't access protocol field type. ([22]Bug + 10801) + * Lua: getting fieldinfo.value for FT_NONE causes assert. ([23]Bug + 10815) + * Buildbot crash output: fuzz-2015-01-01-29029.pcap. ([24]Bug 10823) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + DEC DNA, DECT, FCoIB, Infiniband, IrDA, LCSAP, MIPv6, NAS EPS, RDM, + RSVP, and TCP + + New and Updated Capture File Support + ----------------------------------------------------------------------
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2188 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2189 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2190 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-0562 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-0563 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-0564 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1567407 Title: [SRU] Update to bugfix release 1.10.14 in Trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1567407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs