1
Candidate: CVE-2016-2524
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2524
5
https://www.wireshark.org/security/wnpa-sec-2016-04.html
6
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5a8020a1b6bb73fcb8bb7eb7d53177bc8a9fc703
7
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12002
8
http://www.wireshark.org/security/wnpa-sec-2016-04.html
10
epan/dissectors/packet-x509af.c in the X.509AF dissector in Wireshark 2.0.x
11
before 2.0.2 mishandles the algorithm ID, which allows remote attackers to
12
cause a denial of service (application crash) via a crafted packet.
21
upstream_wireshark: needs-triage
22
precise_wireshark: ignored (reached end-of-life)
23
precise/esm_wireshark: DNE (precise was needed)
24
trusty_wireshark: needed
25
vivid/stable-phone-overlay_wireshark: DNE
26
vivid/ubuntu-core_wireshark: DNE
27
wily_wireshark: ignored (reached end-of-life)
28
xenial_wireshark: needed
29
yakkety_wireshark: ignored (reached end-of-life)
30
zesty_wireshark: ignored (reached end-of-life)
31
artful_wireshark: needed
32
bionic_wireshark: needed
33
devel_wireshark: needed