[Security] Multitude of Vulnerabilities against 1.6.7 in Precise

Bug #1401314 reported by Thomas Ward
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
wireshark (Ubuntu)
In Progress
High
Thomas Ward
Nominated for Precise by Thomas Ward
Nominated for Vivid by Thomas Ward

Bug Description

The Wireshark CVE tracker for the Ubuntu Security Team is here: http://people.canonical.com/~ubuntu-security/cve/pkg/wireshark.html

Per the tracker, and upstream sources such as Debian and elsewhere, the version of Wireshark present in the Precise repositories is both ancient but also is full of security holes, and vulnerable to a huge multitude of CVEs.

The Precise version of the package is, therefore, in need of updating. We had initially looked at backporting Wireshark 1.12 to all releases before Vivid and Utopic, however this will break private third-party modules and some software in the repositories which depend on the 1.6.x API, as the APIs are not reverse compatible in Wireshark versions.

As such, that option went off the table, and the remaining option is to backport as many of the fixes as possible. To that extent, this bug will serve as a master bug to cover those CVEs of which patches and fixes already exist for the 1.6.x branch. (Later bugs may be made for versions which need the fixes modified and manually backported / reverse-engineered).

------

A little different to triage, this bug has been created as "In Progress" and I have assigned it to myself. Given the large number of CVEs impacting it, I have set the Importance as "High" as a result.

The rationale for this is as follows:
(1) All the CVEs already exist and are confirmed.
(2) Several days will need to be taken by me to add each CVE to the bug here, to identify which CVEs need to be fixed.
(3) At the same time, I will be grabbing patches to incorporate into the packaging for a debdiff which will have all the CVE fixes.
(4) Upon 2 and 3 being completed, this bug will be marked as "Confirmed" and myself unsubscribed, at which point I will upload a Security debdiff for consideration and sponsoring by the Security team.

This is likely going to be a multi-day, if not a multi-week, project. This is also not the first bug that will be made for this, it is merely the first of several that are likely to be made.

Revision history for this message
Evan Huus (eapache) wrote :

As mentioned in our previous discussion: it may simplify your life by moving to the last stable 1.6 release (1.6.16 if I recall correctly) and only applying extra patches on top of that. Otherwise you will just end up duplicating a lot of work that the Wireshark team already did when 1.6 series was still supported. Micro-releases within a series do not break the API and contain only security and bug fixes.

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.