Bug 972681 (CVE-2013-4076)
Summary: | CVE-2013-4076 wireshark: Invalid free in the PPP dissector (wnpa-sec-2013-34) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | huzaifas, jrusnack, phatina, rvokal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | wireshark-1.8.8 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-06-11 04:41:48 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 972760, 972762, 979246 | ||
Bug Blocks: | 972772 |
Description
Jan Lieskovsky
2013-06-10 12:03:26 UTC
This issue affects the versions of the wireshark package, as shipped with Fedora release of 17 and 18. Please schedule an update. Created wireshark tracking bugs for this issue Affects: fedora-17 [bug 972760] Created wireshark tracking bugs for this issue Affects: fedora-18 [bug 972762] Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6. External References: http://www.wireshark.org/security/wnpa-sec-2013-34.html wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. |