** Description changed: Upstream provides micro-releases on the 1.10.x branch to fix bugs and security vulnerabilities. 1.10.14 News https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob;f=NEWS;h=f4ef7e33edabafe2b1c36ba4f2a965018bb4536c;hb=refs/heads/master-1.10 - ----------------------------------------------------------- + __________________________________________________________ Wireshark 1.10.14 Release Notes Bug Fixes + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-14 + The WCP dissector could crash while decompressing data. ([2]Bug + 10978) [3]CVE-2015-3811 + * [4]wnpa-sec-2015-15 + The X11 dissector could leak memory. ([5]Bug 11088) + [6]CVE-2015-3812 + * [7]wnpa-sec-2015-17 + The IEEE 802.11 dissector could go into an infinite loop. ([8]Bug + 11110) [9]CVE-2015-3814 + + The following bugs have been fixed: + * Wireshark crashes if "Update list of packets in real time" is + disabled and a display filter is applied while capturing. ([10]Bug + 6217) + * Wireshark relative ISN set incorrectly if raw ISN set to 0. + ([11]Bug 10713) + * Buffer overrun in encryption code. ([12]Bug 10849) + * ICMP Parameter Problem message contains Length of original datagram + is treated as the total IPv4 length. ([13]Bug 10991) + * ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. ([14]Bug + 10992) + * Interface Identifier incorrectly represented by Wireshark. ([15]Bug + 11053) + * Annoying popup when trying to capture on bonding devices on Linux. + ([16]Bug 11058) + * CanOpen dissector fails on frames with RTR and 0 length. ([17]Bug + 11083) + * Typo in secp521r1 curve wrongly identified as sect521r1. ([18]Bug + 11106) + * packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn't filter ENUM. ([19]Bug + 11120) + * Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". + ([20]Bug 11141) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP, + MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL + + New and Updated Capture File Support + + and Savvius OmniPeek Visual Networks + __________________________________________________________ + + Wireshark 1.10.13 Release Notes + + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-07 + The WCP dissector could crash. ([2]Bug 10844) [3]CVE-2015-2188 + * [4]wnpa-sec-2015-08 + The pcapng file parser could crash. ([5]Bug 10895) [6]CVE-2015-2189 + * [7]wnpa-sec-2015-10 + The TNEF dissector could go into an infinite loop. Discovered by + Vlad Tsyrklevich. ([8]Bug 11023) [9]CVE-2015-2190 + + The following bugs have been fixed: + * IPv6 AUTH mobility option parses Mobility SPI and Authentication + Data incorrectly. ([10]Bug 10626) + * DHCP Option 125 Suboption: (1) option-len always expects 1 but + specification allows for more. ([11]Bug 10784) + * Little-endian OS X Bluetooth PacketLogger files aren't handled. + ([12]Bug 10861) + * X.509 certificate serial number incorrectly interpreted as negative + number. ([13]Bug 10862) + * H.248 "ServiceChangeReasonStr" messages are not shown in text + generated by tshark. ([14]Bug 10879) + * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI. + ([15]Bug 10897) + * MEGACO wrong decoding on media port. ([16]Bug 10898) + * Wrong media format. ([17]Bug 10899) + * BSSGP Status PDU decoding fault (missing Mandatory element (0x04) + BVCI for proper packet). ([18]Bug 10903) + * Packets on OpenBSD loopback decoded as raw not null. ([19]Bug + 10956) + * Display Filter Macro unable to edit. ([20]Bug 10957) + * IPv6 Local Mobility Anchor Address mobility option code is treated + incorrectly. ([21]Bug 10961) + * Juniper Packet Mirror dissector expects ipv6 flow label = 0. + ([22]Bug 10976) + * Infinite loop DoS in TNEF dissector. ([23]Bug 11023) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + ANSI IS-637-A, DHCP, GSM MAP, H.248, IPv6, Juniper Jmirror, and + X.509AF + + New and Updated Capture File Support + + PacketLogger, and Pcapng + __________________________________________________________ + + Wireshark 1.10.12 Release Notes + + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2015-03 + The DEC DNA Routing Protocol dissector could crash. ([2]Bug 10724) + [3]CVE-2015-0562 + * [4]wnpa-sec-2015-04 + The SMTP dissector could crash. ([5]Bug 10823) [6]CVE-2015-0563 + * [7]wnpa-sec-2015-05 + Wireshark could crash while decypting TLS/SSL sessions. Discovered + by Noam Rathaus. [8]CVE-2015-0564 + + The following bugs have been fixed: + * WebSocket dissector: empty payload causes + DISSECTOR_ASSERT_NOT_REACHED. ([9]Bug 9332) + * SMTP decoder can dump binary data to terminal in TShark. ([10]Bug + 10536) + * IPv6 Vendor Specific Mobility Option includes the next mobility + option type. ([11]Bug 10618) + * Save PCAP to PCAPng with commentary fails. ([12]Bug 10656) + * Multipath TCP: checksum displayed when it's not there. ([13]Bug + 10692) + * LTE APN-AMBR is decoded incorrectly. ([14]Bug 10699) + * IPv6 Experimental mobility header data is interpreted as options. + ([15]Bug 10703) + * Buildbot crash output: fuzz-2014-11-15-7777.pcap. ([16]Bug 10710) + * Buildbot crash output: fuzz-2014-11-18-30809.pcap. ([17]Bug 10716) + * Buildbot crash output: fuzz-2014-11-22-10244.pcap. ([18]Bug 10724) + * Decoding of longitude value in LCSAP (3GPP TS 29.171) is incorrect. + ([19]Bug 10767) + * Crash when enabling FCoIB manual settings without filling address + field. ([20]Bug 10796) + * RSVP RECORD_ROUTE IPv4 Subobject Flags field incorrect decoding. + ([21]Bug 10799) + * Wireshark Lua engine can't access protocol field type. ([22]Bug + 10801) + * Lua: getting fieldinfo.value for FT_NONE causes assert. ([23]Bug + 10815) + * Buildbot crash output: fuzz-2015-01-01-29029.pcap. ([24]Bug 10823) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + DEC DNA, DECT, FCoIB, Infiniband, IrDA, LCSAP, MIPv6, NAS EPS, RDM, + RSVP, and TCP + + New and Updated Capture File Support + __________________________________________________________ + + Wireshark 1.10.11 Release Notes + + Bug Fixes + The following vulnerabilities have been fixed. - * [1]wnpa-sec-2015-14 - The WCP dissector could crash while decompressing data. ([2]Bug - 10978) [3]CVE-2015-3811 - * [4]wnpa-sec-2015-15 - The X11 dissector could leak memory. ([5]Bug 11088) - [6]CVE-2015-3812 - * [7]wnpa-sec-2015-17 - The IEEE 802.11 dissector could go into an infinite loop. ([8]Bug - 11110) [9]CVE-2015-3814 + * [1]wnpa-sec-2014-20 + SigComp UDVM buffer overflow. ([2]Bug 10662) + [3]CVE-2014-8710 + * [4]wnpa-sec-2014-21 + AMQP crash. ([5]Bug 10582) [6]CVE-2014-8711 + * [7]wnpa-sec-2014-22 + NCP crashes. ([8]Bug 10552, [9]Bug 10628) [10]CVE-2014-8712 + [11]CVE-2014-8713 + * [12]wnpa-sec-2014-23 + TN5250 infinite loops. ([13]Bug 10596) [14]CVE-2014-8714 The following bugs have been fixed: - * Wireshark crashes if "Update list of packets in real time" is - disabled and a display filter is applied while capturing. ([10]Bug - 6217) - * Wireshark relative ISN set incorrectly if raw ISN set to 0. - ([11]Bug 10713) - * Buffer overrun in encryption code. ([12]Bug 10849) - * ICMP Parameter Problem message contains Length of original datagram - is treated as the total IPv4 length. ([13]Bug 10991) - * ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. ([14]Bug - 10992) - * Interface Identifier incorrectly represented by Wireshark. ([15]Bug - 11053) - * Annoying popup when trying to capture on bonding devices on Linux. - ([16]Bug 11058) - * CanOpen dissector fails on frames with RTR and 0 length. ([17]Bug - 11083) - * Typo in secp521r1 curve wrongly identified as sect521r1. ([18]Bug - 11106) - * packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn't filter ENUM. ([19]Bug - 11120) - * Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". - ([20]Bug 11141) + * 6LoWPAN Mesh headers not treated as encapsulating address. + ([15]Bug 10462) + * UCP dissector bug of operation 31 - PID 0639 not + recognized. ([16]Bug 10463) + * iSCSI dissector rejects PDUs with "expected data transfer + length" > 16M. ([17]Bug 10469) + * GTPv2: trigging_tree under Trace information has wrong + length. ([18]Bug 10470) + * Attempt to render an SMS-DELIVER-REPORT instead of an + SMS-DELIVER. ([19]Bug 10547) + * IPv6 Mobility Option IPv6 Address/Prefix marks too many + bytes for the address/prefix field. ([20]Bug 10576) + * IPv6 Mobility Option Binding Authorization Data for FMIPv6 + Authenticator field is read beyond the option data. + ([21]Bug 10577) + * IPv6 Mobility Option Mobile Node Link Layer Identifier + Link-layer Identifier field is read beyond the option data. + ([22]Bug 10578) + * Malformed PTPoE announce packet. ([23]Bug 10611) + * IPv6 Permanent Home Keygen Token mobility option includes + too many bytes for the token field. ([24]Bug 10619) + * IPv6 Redirect Mobility Option K and N bits are parsed + incorrectly. ([25]Bug 10622) + * IPv6 Care Of Test mobility option includes too many bytes + for the Keygen Token field. ([26]Bug 10624) + * IPv6 MESG-ID mobility option is parsed incorrectly. + ([27]Bug 10625) + * IPv6 AUTH mobility option parses Mobility SPI and + Authentication Data incorrectly. ([28]Bug 10626) + * IPv6 DNS-UPDATE-TYPE mobility option includes too many + bytes for the MD identity field. ([29]Bug 10629) + * IPv6 Local Mobility Anchor Address mobility option's code + and reserved fields are parsed as 2 bytes instead of 1. + ([30]Bug 10630) + * TShark crashes when running with PDML on a specific packet. + ([31]Bug 10651) + * IPv6 Mobility Option Context Request reads an extra + request. ([32]Bug 10676) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support - ASN.1 PER, CANopen, GSM RLC/MAC, GSMTAP, ICMP, IEEE 802.11, LPP, - MEGACO, PKCS-1, PPP IPv6CP, SRVLOC, SSL, TCP, WCP, X11, and ZigBee ZCL + 6LoWPAN, AMQP, GSM MAP, GTPv2, H.223, IEEE 802.11, iSCSI, MIH, + Mobile IPv6, PTPoE, TN5250, and UCP New and Updated Capture File Support - and Savvius OmniPeek Visual Networks - --------------------------------------------------------------------- - - Wireshark 1.10.13 Release Notes + Catapult DCT2000, HP-UX nettl, pcap-ng, and Sniffer (DOS) + __________________________________________________________ + + Wireshark 1.10.10 Release Notes Bug Fixes The following vulnerabilities have been fixed. - * [1]wnpa-sec-2015-07 - The WCP dissector could crash. ([2]Bug 10844) [3]CVE-2015-2188 - * [4]wnpa-sec-2015-08 - The pcapng file parser could crash. ([5]Bug 10895) [6]CVE-2015-2189 - * [7]wnpa-sec-2015-10 - The TNEF dissector could go into an infinite loop. Discovered by - Vlad Tsyrklevich. ([8]Bug 11023) [9]CVE-2015-2190 + * [1]wnpa-sec-2014-12 + RTP dissector crash. ([2]Bug 9920) [3]CVE-2014-6421 + [4]CVE-2014-6422 + * [5]wnpa-sec-2014-13 + MEGACO dissector infinite loop. ([6]Bug 10333) + [7]CVE-2014-6423 + * [8]wnpa-sec-2014-14 + Netflow dissector crash. ([9]Bug 10370) [10]CVE-2014-6424 + * [11]wnpa-sec-2014-17 + RTSP dissector crash. ([12]Bug 10381) [13]CVE-2014-6427 + * [14]wnpa-sec-2014-18 + SES dissector crash. ([15]Bug 10454) [16]CVE-2014-6428 + * [17]wnpa-sec-2014-19 + Sniffer file parser crash. ([18]Bug 10461) + [19]CVE-2014-6429 [20]CVE-2014-6430 [21]CVE-2014-6431 + [22]CVE-2014-6432 The following bugs have been fixed: - * IPv6 AUTH mobility option parses Mobility SPI and Authentication - Data incorrectly. ([10]Bug 10626) - * DHCP Option 125 Suboption: (1) option-len always expects 1 but - specification allows for more. ([11]Bug 10784) - * Little-endian OS X Bluetooth PacketLogger files aren't handled. - ([12]Bug 10861) - * X.509 certificate serial number incorrectly interpreted as negative - number. ([13]Bug 10862) - * H.248 "ServiceChangeReasonStr" messages are not shown in text - generated by tshark. ([14]Bug 10879) - * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI. - ([15]Bug 10897) - * MEGACO wrong decoding on media port. ([16]Bug 10898) - * Wrong media format. ([17]Bug 10899) - * BSSGP Status PDU decoding fault (missing Mandatory element (0x04) - BVCI for proper packet). ([18]Bug 10903) - * Packets on OpenBSD loopback decoded as raw not null. ([19]Bug - 10956) - * Display Filter Macro unable to edit. ([20]Bug 10957) - * IPv6 Local Mobility Anchor Address mobility option code is treated - incorrectly. ([21]Bug 10961) - * Juniper Packet Mirror dissector expects ipv6 flow label = 0. - ([22]Bug 10976) - * Infinite loop DoS in TNEF dissector. ([23]Bug 11023) + * Wireshark can crash during remote capture (rpcap) + configuration. ([23]Bug 3554, [24]Bug 6922, + ws-buglink:7021) + * MIPv6 Service Selection Identifier parse error. ([25]Bug + 10323) + * 802.11 BA sequence number decode is broken. ([26]Bug 10334) + * TRILL NLPID 0xc0 unknown to Wireshark. ([27]Bug 10382) + * Wrong decoding of RPKI RTR End of Data PDU. ([28]Bug 10411) + * Misparsed NTP control assignments with empty values. + ([29]Bug 10417) + * 6LoWPAN multicast address decompression problems. ([30]Bug + 10426) + * GUI Hangs when Selecting Path to GeoIP Files. ([31]Bug + 10434) + * 6LoWPAN context handling not working. ([32]Bug 10443) + * SIP: When export to a CSV, Info is changed to differ. + ([33]Bug 10453) + * Typo in packet-netflow.c. ([34]Bug 10458) + * UCP dissector bug of operation 30 - data not decoded. + ([35]Bug 10464) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support - ANSI IS-637-A, DHCP, GSM MAP, H.248, IPv6, Juniper Jmirror, and - X.509AF + 6LoWPAN, DVB-CI, IEEE 802.11, MEGACO, MIPv6, Netflow, NTP, OSI, + RPKI RTR, RTP, RTSP, SES, SIP, and UCP New and Updated Capture File Support - PacketLogger, and Pcapng - --------------------------------------------------------------------- - - Wireshark 1.10.12 Release Notes + DOS Sniffer, and NetScaler + __________________________________________________________ + + Wireshark 1.10.9 Release Notes Bug Fixes The following vulnerabilities have been fixed. - * [1]wnpa-sec-2015-03 - The DEC DNA Routing Protocol dissector could crash. ([2]Bug 10724) - [3]CVE-2015-0562 - * [4]wnpa-sec-2015-04 - The SMTP dissector could crash. ([5]Bug 10823) [6]CVE-2015-0563 - * [7]wnpa-sec-2015-05 - Wireshark could crash while decypting TLS/SSL sessions. Discovered - by Noam Rathaus. [8]CVE-2015-0564 + * [1]wnpa-sec-2014-08 + The Catapult DCT2000 and IrDA dissectors could underrun a + buffer. + Versions affected: 1.10.0 to 1.10.8 + * [2]wnpa-sec-2014-09 + The GSM Management dissector could crash. ([3]Bug 10216) + Versions affected: 1.10.0 to 1.10.8 + * [4]wnpa-sec-2014-10 + The RLC dissector could crash. ([5]Bug 9795) + Versions affected: 1.10.0 to 1.10.8 + * [6]wnpa-sec-2014-11 + The ASN.1 BER dissector could crash. ([7]Bug 10187) + Versions affected: 1.10.0 to 1.10.8 The following bugs have been fixed: - * WebSocket dissector: empty payload causes - DISSECTOR_ASSERT_NOT_REACHED. ([9]Bug 9332) - * SMTP decoder can dump binary data to terminal in TShark. ([10]Bug - 10536) - * IPv6 Vendor Specific Mobility Option includes the next mobility - option type. ([11]Bug 10618) - * Save PCAP to PCAPng with commentary fails. ([12]Bug 10656) - * Multipath TCP: checksum displayed when it's not there. ([13]Bug - 10692) - * LTE APN-AMBR is decoded incorrectly. ([14]Bug 10699) - * IPv6 Experimental mobility header data is interpreted as options. - ([15]Bug 10703) - * Buildbot crash output: fuzz-2014-11-15-7777.pcap. ([16]Bug 10710) - * Buildbot crash output: fuzz-2014-11-18-30809.pcap. ([17]Bug 10716) - * Buildbot crash output: fuzz-2014-11-22-10244.pcap. ([18]Bug 10724) - * Decoding of longitude value in LCSAP (3GPP TS 29.171) is incorrect. - ([19]Bug 10767) - * Crash when enabling FCoIB manual settings without filling address - field. ([20]Bug 10796) - * RSVP RECORD_ROUTE IPv4 Subobject Flags field incorrect decoding. - ([21]Bug 10799) - * Wireshark Lua engine can't access protocol field type. ([22]Bug - 10801) - * Lua: getting fieldinfo.value for FT_NONE causes assert. ([23]Bug - 10815) - * Buildbot crash output: fuzz-2015-01-01-29029.pcap. ([24]Bug 10823) + * GSM MAP: ensure that p2p_dir is always initialized before + calling GSM SMS dissector ([8]Bug 10234) + * BFCP: include padding length in calculation of correct + attribute length ([9]Bug 10240) + * GTP: allow empty Data Record Packet IE ([10]Bug 10277) + * WebSocket: increase max unmask payload size to 256K and + indicate that packet is truncated is going above the new + limit ([11]Bug 10283) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support - DEC DNA, DECT, FCoIB, Infiniband, IrDA, LCSAP, MIPv6, NAS EPS, RDM, - RSVP, and TCP - New and Updated Capture File Support - ---------------------------------------------------------------------- + __________________________________________________________ + + Wireshark 1.10.8 Release Notes + + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2014-07 + The frame metadissector could crash. ([2]Bug 9999, [3]Bug + 10030) + Versions affected: 1.10.0 to 1.10.7 + [4]CVE-2014-4020 + + The following bugs have been fixed: + * VoIP flow graph crash upon opening. ([5]Bug 9179) + * Tshark with "-F pcap" still generates a pcapng file. + ([6]Bug 9991) + * IPv6 Next Header 0x3d recognized as SHIM6. ([7]Bug 9995) + * Failed to export pdml on large pcap. ([8]Bug 10081) + * TCAP: set a fence on info column after calling sub + dissector ([9]Bug 10091) + * Dissector bug in JSON protocol. ([10]Bug 10115) + * GSM RLC MAC: do not skip too many lines of the CSN_DESCR + when the field is missing ([11]Bug 10120) + * Wireshark PEEKREMOTE incorrectly decoding QoS data packets + from Cisco Sniffer APs. ([12]Bug 10139) + * IEEE 802.11: fix dissection of HT Capabilities ([13]Bug + 10166) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + CIP, EtherNet/IP, GSM RLC MAC, IEEE 802.11, IPv6, and TCAP + + New and Updated Capture File Support + + pcap-ng, and PEEKREMOTE + __________________________________________________________ + + Wireshark 1.10.7 Release Notes + + Bug Fixes + + The following vulnerabilities have been fixed. + * [1]wnpa-sec-2014-06 + The RTP dissector could crash. ([2]Bug 9885) + Versions affected: 1.10.0 to 1.10.6 + [3]CVE-2014-2907 + + The following bugs have been fixed: + * RTP not decoded inside the conversation in v.1.10.1 ([4]Bug + 9021) + * SIP/SDP: disabled second media stream disables all media + streams ([5]Bug 9835) + * Lua: trying to get/access a Preference before its + registered causes a segfault ([6]Bug 9853) + * Some value_string strings contain newlines. ([7]Bug 9878) + * Tighten the NO_MORE_DATA_CHECK macros ([8]Bug 9932) + * Fix crash when calling "MAP Summary" dialog when no file is + open ([9]Bug 9934) + * Fix comparing a sequence number of TCP fragment when its + value wraps over uint32_t limit ([10]Bug 9936) + + New and Updated Features + + There are no new features in this release. + + New Protocol Support + + There are no new protocols in this release. + + Updated Protocol Support + + ANSI A, DVB-CI, GSM DTAP, GSM MAP, IEEE 802.11, LCSAP, LTE RRC, + MAC LTE, Prism, RTP, SDP, SIP, and TCP + + New and Updated Capture File Support + + and There are no changes in this release. + __________________________________________________________
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8710 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8711 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8712 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8713 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8714 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6421 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6422 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6423 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6424 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6427 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6428 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6429 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6430 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6431 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6432 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-4020 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-2907 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1567407 Title: [SRU] Update to bugfix release 1.10.14 in Trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wireshark/+bug/1567407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs