~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2017-13764

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-13764
2
 
PublicDate: 2017-08-30
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13764
5
 
 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13925
6
 
 https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b87ffbd12bddf64582c0a6e082b462744474de94
7
 
 https://www.wireshark.org/security/wnpa-sec-2017-40.html
8
 
Description:
9
 
 In Wireshark 2.4.0, the Modbus dissector could crash with a NULL pointer
10
 
 dereference. This was addressed in epan/dissectors/packet-mbtcp.c by adding
11
 
 length validation.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
Bugs:
15
 
Priority: medium
16
 
Discovered-by: Alessandro Cavallaro
17
 
Assigned-to:
18
 
 
19
 
Patches_wireshark:
20
 
upstream_wireshark: needs-triage
21
 
precise/esm_wireshark: DNE
22
 
trusty_wireshark: needs-triage
23
 
vivid/ubuntu-core_wireshark: DNE
24
 
xenial_wireshark: needs-triage
25
 
zesty_wireshark: ignored (reached end-of-life)
26
 
artful_wireshark: needed
27
 
bionic_wireshark: needed
28
 
devel_wireshark: needed