1
Candidate: CVE-2016-6510
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6510
5
https://www.wireshark.org/security/wnpa-sec-2016-46.html
6
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
7
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=47a5fa850b388fcf4ea762073806f01b459820fe
8
http://www.openwall.com/lists/oss-security/2016/07/28/3
10
Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in
11
Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote
12
attackers to cause a denial of service (stack-based buffer overflow and
13
application crash) via a crafted packet.
22
upstream_wireshark: released (2.0.5+ga3be9c6-1)
23
precise_wireshark: ignored (reached end-of-life)
24
precise/esm_wireshark: DNE (precise was needs-triage)
25
trusty_wireshark: released (1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1)
26
vivid/stable-phone-overlay_wireshark: DNE
27
vivid/ubuntu-core_wireshark: DNE
28
xenial_wireshark: released (2.2.6+g32dac6a-2ubuntu0.16.04)
29
yakkety_wireshark: not-affected (2.0.5+ga3be9c6-1)
30
zesty_wireshark: not-affected (2.0.5+ga3be9c6-1)
31
artful_wireshark: not-affected (2.0.5+ga3be9c6-1)
32
bionic_wireshark: not-affected (2.0.5+ga3be9c6-1)
33
devel_wireshark: not-affected (2.0.5+ga3be9c6-1)