An update for wireshark is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1132
Final
1.0
1.0
2021-04-07
Initial
2021-04-07
2021-04-07
openEuler SA Tool V1.0
2021-04-07
wireshark security update
An update for wireshark is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
Wireshark is an open source tool for profiling network traffic and analyzing packets. Such a tool is often referred to as a network analyzer, network protocol analyzer or sniffer. Wireshark, formerly known as Ethereal, can be used to examine the details of traffic at a variety of levels ranging from connection-level information to the bits that make up a single packet. Packet capture can provide a network administrator with information about individual packets such as transmit time, source, destination, protocol type and header data. This information can be useful for evaluating security events and troubleshooting network security device issues.
Security Fix(es):
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.(CVE-2020-9431)
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.(CVE-2020-9428)
In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.(CVE-2019-19553)
In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.(CVE-2019-13619)
An update for wireshark is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
wireshark
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1132
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-9431
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-9428
https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-19553
https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-13619
https://nvd.nist.gov/vuln/detail/CVE-2020-9431
https://nvd.nist.gov/vuln/detail/CVE-2020-9428
https://nvd.nist.gov/vuln/detail/CVE-2019-19553
https://nvd.nist.gov/vuln/detail/CVE-2019-13619
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
wireshark-debugsource-2.6.2-18.oe1.aarch64.rpm
wireshark-2.6.2-18.oe1.aarch64.rpm
wireshark-devel-2.6.2-18.oe1.aarch64.rpm
wireshark-debuginfo-2.6.2-18.oe1.aarch64.rpm
wireshark-help-2.6.2-18.oe1.aarch64.rpm
wireshark-debugsource-2.6.2-19.oe1.aarch64.rpm
wireshark-devel-2.6.2-19.oe1.aarch64.rpm
wireshark-2.6.2-19.oe1.aarch64.rpm
wireshark-debuginfo-2.6.2-19.oe1.aarch64.rpm
wireshark-help-2.6.2-19.oe1.aarch64.rpm
wireshark-2.6.2-18.oe1.src.rpm
wireshark-2.6.2-19.oe1.src.rpm
wireshark-debugsource-2.6.2-18.oe1.x86_64.rpm
wireshark-help-2.6.2-18.oe1.x86_64.rpm
wireshark-debuginfo-2.6.2-18.oe1.x86_64.rpm
wireshark-devel-2.6.2-18.oe1.x86_64.rpm
wireshark-2.6.2-18.oe1.x86_64.rpm
wireshark-debugsource-2.6.2-19.oe1.x86_64.rpm
wireshark-debuginfo-2.6.2-19.oe1.x86_64.rpm
wireshark-2.6.2-19.oe1.x86_64.rpm
wireshark-help-2.6.2-19.oe1.x86_64.rpm
wireshark-devel-2.6.2-19.oe1.x86_64.rpm
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
2021-04-07
CVE-2020-9431
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
wireshark security update
2021-04-07
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1132
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.
2021-04-07
CVE-2020-9428
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
wireshark security update
2021-04-07
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1132
In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection.
2021-04-07
CVE-2019-19553
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
wireshark security update
2021-04-07
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1132
In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.
2021-04-07
CVE-2019-13619
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
wireshark security update
2021-04-07
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1132