Date: Sat, 6 Aug 2016 00:24:00 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r419719 - head/security/vuxml Message-ID: <201608060024.u760O0xn022038@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Sat Aug 6 00:24:00 2016 New Revision: 419719 URL: https://svnweb.freebsd.org/changeset/ports/419719 Log: Document wnpa-sec-2016-41 through wnpa-sec-2016-49 for issues fixed in Wireshark 2.0.5 Security: CVE-2016-6505 Security: CVE-2016-6506 Security: CVE-2016-6508 Security: CVE-2016-6509 Security: CVE-2016-6510 Security: CVE-2016-6511 Security: CVE-2016-6512 Security: CVE-2016-6513 Security: https://vuxml.FreeBSD.org/freebsd/610101ea-5b6a-11e6-b334-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Aug 6 00:09:48 2016 (r419718) +++ head/security/vuxml/vuln.xml Sat Aug 6 00:24:00 2016 (r419719) @@ -58,6 +58,62 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="610101ea-5b6a-11e6-b334-002590263bf5"> + <topic>wireshark -- multiple vulnerabilities</topic> + <affects> + <package> + <name>wireshark</name> + <name>wireshark-lite</name> + <name>wireshark-qt5</name> + <name>tshark</name> + <name>tshark-lite</name> + <range><lt>2.0.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Wireshark development team reports:</p> + <blockquote cite="https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html"> + <p>The following vulnerabilities have been fixed:</p> + <ul> + <li><p>wnpa-sec-2016-41</p> + <p>PacketBB crash. (Bug 12577)</p></li> + <li><p>wnpa-sec-2016-42</p> + <p>WSP infinite loop. (Bug 12594)</p></li> + <li><p>wnpa-sec-2016-44</p> + <p>RLC long loop. (Bug 12660)</p></li> + <li><p>wnpa-sec-2016-45</p> + <p>LDSS dissector crash. (Bug 12662)</p></li> + <li><p>wnpa-sec-2016-46</p> + <p>RLC dissector crash. (Bug 12664)</p></li> + <li><p>wnpa-sec-2016-47</p> + <p>OpenFlow long loop. (Bug 12659)</p></li> + <li><p>wnpa-sec-2016-48</p> + <p>MMSE, WAP, WBXML, and WSP infinite loop. (Bug 12661)</p></li> + <li><p>wnpa-sec-2016-49</p> + <p>WBXML crash. (Bug 12663)</p></li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-6505</cvename> + <cvename>CVE-2016-6506</cvename> + <cvename>CVE-2016-6508</cvename> + <cvename>CVE-2016-6509</cvename> + <cvename>CVE-2016-6510</cvename> + <cvename>CVE-2016-6511</cvename> + <cvename>CVE-2016-6512</cvename> + <cvename>CVE-2016-6513</cvename> + <url>https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html</url> + <url>http://www.openwall.com/lists/oss-security/2016/08/01/4</url> + </references> + <dates> + <discovery>2016-07-27</discovery> + <entry>2016-08-06</entry> + </dates> + </vuln> + <vuln vid="3e08047f-5a6c-11e6-a6c3-14dae9d210b8"> <topic>p5-XSLoader -- local arbitrary code execution</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608060024.u760O0xn022038>