MGASA-2016-0223

Source
https://advisories.mageia.org/MGASA-2016-0223.html
Import Source
https://advisories.mageia.org/MGASA-2016-0223.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0223
Related
Published
2016-06-13T15:55:41Z
Modified
2016-06-13T15:47:42Z
Summary
Updated wireshark packages fix security vulnerability
Details

Updated wireshark packages fix security vulnerabilities:

The SPOOLS dissector could go into an infinite loop (CVE-2016-5350).

The IEEE 802.11 dissector could crash (CVE-2016-5351).

The IEEE 802.11 dissector could crash (CVE-2016-5352).

The UMTS FP dissector could crash (CVE-2016-5353).

Some USB dissectors could crash (CVE-2016-5354).

The Toshiba file parser could crash (CVE-2016-5355).

The CoSine file parser could crash (CVE-2016-5356).

The NetScreen file parser could crash (CVE-2016-5357).

The Ethernet dissector could crash (CVE-2016-5358).

Infinite loop in parsewbxmltag_defined() in WBXML Dissector (CVE-2016-5359).

References
Credits

Affected packages

Mageia:5 / wireshark

Package

Name
wireshark
Purl
pkg:rpm/mageia/wireshark?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.4-1.mga5

Ecosystem specific

{
    "section": "core"
}