{"id":"MGASA-2016-0091","summary":"Updated wireshark packages fix security vulnerabilities","details":"Updated wireshark packages fix security vulnerabilities:\n\nASN.1 BER dissector crash (CVE-2016-2522).\n\nDNP dissector infinite loop (CVE-2016-2523).\n\nX.509AF dissector crash (CVE-2016-2524).\n\nHTTP/2 dissector crash (CVE-2016-2525).\n\nHiQnet dissector crash (CVE-2016-2526).\n\n3GPP TS 32.423 Trace file parser crash (CVE-2016-2527).\n\nLBMC dissector crash (CVE-2016-2528).\n\niSeries file parser crash (CVE-2016-2529).\n\nRSL dissector crash (CVE-2016-2530, CVE-2016-2531).\n\nLLRP dissector crash (CVE-2016-2532).\n\nThe wireshark package has been updated to version 2.0.2, fixing these issues as\nwell as other dissector crashes, a dissector loop issue, another file parser\ncrash, and several other bugs.  See the upstream release notes for details.\n","modified":"2026-04-16T06:26:05.561033236Z","published":"2016-03-02T18:28:46Z","upstream":["CVE-2016-2522","CVE-2016-2523","CVE-2016-2524","CVE-2016-2525","CVE-2016-2526","CVE-2016-2527","CVE-2016-2528","CVE-2016-2529","CVE-2016-2530","CVE-2016-2531","CVE-2016-2532"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0091.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17848"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-02.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-03.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-04.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-05.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-06.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-07.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-08.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-09.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-10.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-11.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-12.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-13.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-14.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-15.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-16.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-17.html"},{"type":"WEB","url":"https://www.wireshark.org/security/wnpa-sec-2016-18.html"},{"type":"WEB","url":"https://www.wireshark.org/docs/relnotes/wireshark-2.0.2.html"},{"type":"WEB","url":"https://www.wireshark.org/news/20160226.html"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/wireshark?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.2-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0091.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}