Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#68167 - [security][wireshark-cli] CVE-2020-26575
Attached to Project:
Community Packages
Opened by loqs (loqs) - Friday, 09 October 2020, 12:12 GMT
Last edited by Andreas Radke (AndyRTR) - Thursday, 22 July 2021, 05:30 GMT
Opened by loqs (loqs) - Friday, 09 October 2020, 12:12 GMT
Last edited by Andreas Radke (AndyRTR) - Thursday, 22 July 2021, 05:30 GMT
|
DetailsDescription:
In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement. Additional info: * wireshark-cli 3.2.7-1 * https://nvd.nist.gov/vuln/detail/CVE-2020-26575 |
This task depends upon
Closed by Andreas Radke (AndyRTR)
Thursday, 22 July 2021, 05:30 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed wireshark 3.4.0-1
Thursday, 22 July 2021, 05:30 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed wireshark 3.4.0-1
[1] https://gitlab.com/wireshark/wireshark/-/commit/2bdcb78afd65d58af9ea72aff0f360408e388db8