The following vulnerabilities have been fixed: * [1]wnpa-sec-2017-12 IMAP dissector crash ([2]Bug 13466) [3]CVE-2017-7703 * [4]wnpa-sec-2017-13 WBMXL dissector infinite loop ([5]Bug 13477) [6]CVE-2017-7702 * [7]wnpa-sec-2017-14 NetScaler file parser infinite loop ([8]Bug 13478) [9]CVE-2017-7700 * [10]wnpa-sec-2017-15 RPCoRDMA dissector infinite loop ([11]Bug 13558) [12]CVE-2017-7705 * [13]wnpa-sec-2017-16 BGP dissector infinite loop ([14]Bug 13557) [15]CVE-2017-7701 * [16]wnpa-sec-2017-17 DOF dissector infinite loop ([17]Bug 13453) [18]CVE-2017-7704 * [19]wnpa-sec-2017-18 PacketBB dissector crash ([20]Bug 13559) * [21]wnpa-sec-2017-19 SLSK dissector long loop ([22]Bug 13576) * [23]wnpa-sec-2017-20 SIGCOMP dissector infinite loop ([24]Bug 13578) * [25]wnpa-sec-2017-21 WSP dissector infinite loop ([26]Bug 13581)
Arch teams, please test and mark stable: =net-analyzer/wireshark-2.2.6 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Stable for HPPA.
arm ppc stable
ppc64 stable.
Stable for AMD64 x86.
Arches, can we please complete stabilization, tis is past due.
Stable on alpha.
Added to an existing GLSA Request. Please finish up stabilization for sparc and ia64.
This issue was resolved and addressed in GLSA 201706-12 at https://security.gentoo.org/glsa/201706-12 by GLSA coordinator Kristian Fiskerstrand (K_F).
Superseded by bug 620858.
GLSA was released for this already. Cleanup will happen in the latest bug.