Upstream has released new versions today (February 26): https://www.wireshark.org/news/20200226.html Updated package uploaded for Mageia 7. Advisory: ======================== Updated wireshark packages fix security vulnerabilities: LTE RRC dissector memory leak. WiMax DLMAP dissector crash. EAP dissector crash. References: https://www.wireshark.org/security/wnpa-sec-2020-03 https://www.wireshark.org/security/wnpa-sec-2020-04 https://www.wireshark.org/security/wnpa-sec-2020-05 https://www.wireshark.org/docs/relnotes/wireshark-3.0.9.html https://www.wireshark.org/news/20200226.html ======================== Updated packages in core/updates_testing: ======================== wireshark-3.0.9-1.mga7 libwireshark12-3.0.9-1.mga7 libwiretap9-3.0.9-1.mga7 libwscodecs2-3.0.9-1.mga7 libwsutil10-3.0.9-1.mga7 libwireshark-devel-3.0.9-1.mga7 wireshark-tools-3.0.9-1.mga7 tshark-3.0.9-1.mga7 rawshark-3.0.9-1.mga7 dumpcap-3.0.9-1.mga7 from wireshark-3.0.9-1.mga7.src.rpm
Testing procedure: https://wiki.mageia.org/en/QA_procedure:Wireshark
Keywords: (none) => has_procedure
MGA7-64 Plasma on Lenovo B50 No installation issues. Followed testprocedure successfully with one exception: $ dftest ip bash: dftest: command not found which is the same as in bug 25436, so no reason to withhold OK
Whiteboard: (none) => MGA7-64-OKCC: (none) => herman.viaene
Validating. Advisory in Comment 0.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
Keywords: (none) => advisoryCC: (none) => tmb
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0111.html
Status: NEW => RESOLVEDResolution: (none) => FIXED