news 28 Posted June 30, 2016 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : wireshark Version : 1.12.1+g01b65bf-4+deb8u6~deb7u2 CVE ID : CVE-2016-5350 CVE-2016-5351 CVE-2016-5353 CVE-2016-5354 CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5359 The following vulnerabilities have been discovered in the Wheezy's Wireshark version: CVE-2016-5350 The SPOOLS dissector could go into an infinite loop CVE-2016-5351 The IEEE 802.11 dissector could crash CVE-2016-5353 The UMTS FP dissector could crash CVE-2016-5354 Some USB dissectors could crash CVE-2016-5355 The Toshiba file parser could crash CVE-2016-5356 The CoSine file parser could crash CVE-2016-5357 The NetScreen file parser could crash CVE-2016-5359 The WBXML dissector could go into an infinite loop For Debian 7 "Wheezy", these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u2. We recommend that you upgrade your wireshark packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXdZBiAAoJEPZk0la0aRp99lcQAMun3of2REJEf4+ZG7Av/DQy W0VCoCrHTfv2yQolJfO87UF/WqPrP4F9m6tDSmJVgjH/WPhhlnJo6h+1krWADtD5 JRpO/tdYNXpZdh0UOMi59GO/PUkgvQ7XqP8M60vsS4q4kdoW8vgTAbWrbKzvjAGi xQISmn5L8/ZJlH2Vc1hikhojvkr+oQSDw9ydSmjL35y8x6PfFBnziRHAwp7khPFC WiAs/a72wKXcj0QxZVvDQOOKaq01lGnp84RT4fKyU6+bOSvG8C+fTDRGOx0on7xw 11WkDGw9cxE0beFYwtES3KLhRd3oAGg1RMnaA7ygDGCzPdqIBgS0X+5LuLUA20Nu gMnZenBmMx9/ym5Y+RDw0zQ3vvUqLT4Wq1vdySwK3of97EZEfZarC00eKJgjjQ1C 5EQwpczqWu7ftHFR5fmobHsQESJFr+FtOyfeFmdAjMm5HDfETiBcxMhMMNdgsoWf tRofMEKelenpYwf/UbU8PZ36P086ZgalraJ0cX5lZCusDJKfr9h/98kugjEuD9Qx gzyI1iz3QkhmM40VLFXZoxbaJlZXD05GTy0GJ0ihFoYU4E55Hvost8OvOPfdEJAh NWrxM9bvJ9lB268zBokq1DMU64ZRpmFvbmU9vZugYbTEbQ+BMxKrfpJ29nxsMgsG JHR8lrOD5q4Mze1Lwdf8 =SfkF -----END PGP SIGNATURE----- Share this post Link to post