From ${URL} : It was reported that the libpcap file parser could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. This is reported to affect Wireshark versions 1.10.0 to 1.10.3 and is fixed in 1.10.4. According to the upstream bug report, it was only ever reproduced in Windows, however the upstream advisory does not indicate that it is Windows-only. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9753 External References: http://www.wireshark.org/security/wnpa-sec-2014-05.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
@jer, this is already fixed by another bug it seems, but why are you removed the CVE identifier from the header? It is right.
(In reply to Mikle Kolyada from comment #1) I removed what exactly?
This issue was resolved and addressed in GLSA 201406-33 at http://security.gentoo.org/glsa/glsa-201406-33.xml by GLSA coordinator Mikle Kolyada (Zlogene).