An update for wireshark is now available for openEuler-24.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1727 Final 1.0 1.0 2024-06-14 Initial 2024-06-14 2024-06-14 openEuler SA Tool V1.0 2024-06-14 wireshark security update An update for wireshark is now available for openEuler-24.03-LTS. Wireshark is an open source tool for profiling network traffic and analyzing packets. Such a tool is often referred to as a network analyzer, network protocol analyzer or sniffer. Security Fix(es): Memory handling issue in editcap could cause denial of service via crafted capture file(CVE-2024-4853) MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file(CVE-2024-4854) Use after free issue in editcap could cause denial of service via crafted capture file(CVE-2024-4855) An update for wireshark is now available for openEuler-24.03-LTS. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium wireshark https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4853 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4854 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4855 https://nvd.nist.gov/vuln/detail/CVE-2024-4853 https://nvd.nist.gov/vuln/detail/CVE-2024-4854 https://nvd.nist.gov/vuln/detail/CVE-2024-4855 openEuler-24.03-LTS wireshark-3.6.14-9.oe2403.aarch64.rpm wireshark-debuginfo-3.6.14-9.oe2403.aarch64.rpm wireshark-help-3.6.14-9.oe2403.aarch64.rpm wireshark-devel-3.6.14-9.oe2403.aarch64.rpm wireshark-debugsource-3.6.14-9.oe2403.aarch64.rpm wireshark-3.6.14-9.oe2403.src.rpm wireshark-devel-3.6.14-9.oe2403.x86_64.rpm wireshark-help-3.6.14-9.oe2403.x86_64.rpm wireshark-3.6.14-9.oe2403.x86_64.rpm wireshark-debuginfo-3.6.14-9.oe2403.x86_64.rpm wireshark-debugsource-3.6.14-9.oe2403.x86_64.rpm Memory handling issue in editcap could cause denial of service via crafted capture file 2024-06-14 CVE-2024-4853 openEuler-24.03-LTS Medium 4.2 AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L wireshark security update 2024-06-14 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727 MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file 2024-06-14 CVE-2024-4854 openEuler-24.03-LTS Medium 5.7 AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H wireshark security update 2024-06-14 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727 Use after free issue in editcap could cause denial of service via crafted capture file 2024-06-14 CVE-2024-4855 openEuler-24.03-LTS Medium 5.0 AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L wireshark security update 2024-06-14 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1727