An update for wireshark is now available for openEuler-24.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1727
Final
1.0
1.0
2024-06-14
Initial
2024-06-14
2024-06-14
openEuler SA Tool V1.0
2024-06-14
wireshark security update
An update for wireshark is now available for openEuler-24.03-LTS.
Wireshark is an open source tool for profiling network traffic and analyzing packets. Such a tool is often referred to as a network analyzer, network protocol analyzer or sniffer.
Security Fix(es):
Memory handling issue in editcap could cause denial of service via crafted capture file(CVE-2024-4853)
MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file(CVE-2024-4854)
Use after free issue in editcap could cause denial of service via crafted capture file(CVE-2024-4855)
An update for wireshark is now available for openEuler-24.03-LTS.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
wireshark
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4853
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4854
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4855
https://nvd.nist.gov/vuln/detail/CVE-2024-4853
https://nvd.nist.gov/vuln/detail/CVE-2024-4854
https://nvd.nist.gov/vuln/detail/CVE-2024-4855
openEuler-24.03-LTS
wireshark-3.6.14-9.oe2403.aarch64.rpm
wireshark-debuginfo-3.6.14-9.oe2403.aarch64.rpm
wireshark-help-3.6.14-9.oe2403.aarch64.rpm
wireshark-devel-3.6.14-9.oe2403.aarch64.rpm
wireshark-debugsource-3.6.14-9.oe2403.aarch64.rpm
wireshark-3.6.14-9.oe2403.src.rpm
wireshark-devel-3.6.14-9.oe2403.x86_64.rpm
wireshark-help-3.6.14-9.oe2403.x86_64.rpm
wireshark-3.6.14-9.oe2403.x86_64.rpm
wireshark-debuginfo-3.6.14-9.oe2403.x86_64.rpm
wireshark-debugsource-3.6.14-9.oe2403.x86_64.rpm
Memory handling issue in editcap could cause denial of service via crafted capture file
2024-06-14
CVE-2024-4853
openEuler-24.03-LTS
Medium
4.2
AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
wireshark security update
2024-06-14
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727
MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file
2024-06-14
CVE-2024-4854
openEuler-24.03-LTS
Medium
5.7
AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
wireshark security update
2024-06-14
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727
Use after free issue in editcap could cause denial of service via crafted capture file
2024-06-14
CVE-2024-4855
openEuler-24.03-LTS
Medium
5.0
AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
wireshark security update
2024-06-14
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727