Upstream has released new versions on April 8: https://www.wireshark.org/news/20200408.html Updated package uploaded for Mageia 7. Advisory: ======================== Updated wireshark packages fix security vulnerability: The BACapp dissector could crash (CVE-2020-11647). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647 https://www.wireshark.org/security/wnpa-sec-2020-07 https://www.wireshark.org/docs/relnotes/wireshark-3.0.10.html https://www.wireshark.org/news/20200408.html ======================== Updated packages in core/updates_testing: ======================== wireshark-3.0.10-1.mga7 libwireshark12-3.0.10-1.mga7 libwiretap9-3.0.10-1.mga7 libwscodecs2-3.0.10-1.mga7 libwsutil10-3.0.10-1.mga7 libwireshark-devel-3.0.10-1.mga7 wireshark-tools-3.0.10-1.mga7 tshark-3.0.10-1.mga7 rawshark-3.0.10-1.mga7 dumpcap-3.0.10-1.mga7 from wireshark-3.0.10-1.mga7.src.rpm
Testing procedure: https://wiki.mageia.org/en/QA_procedure:Wireshark
Keywords: (none) => has_procedure
MGA7-64 Plasma on Lenovo B50 No installation issues. Ref to bug 25436 Comment 1. Repeated all tests therein (refering to the QA procedure which is a bit outdated), with the same results. So OK for me
Whiteboard: (none) => MGA7-64-OKCC: (none) => herman.viaene
Sounds like someone in the know should revise the QA procedure. Validating. Advisory in Comment 0.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
CC: (none) => tmbKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0172.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED