SUSE-SU-2018:2891-2: moderate: Security update for wireshark
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Oct 18 10:12:48 MDT 2018
SUSE Security Update: Security update for wireshark
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:2891-2
Rating: moderate
References: #1094301 #1101776 #1101777 #1101786 #1101788
#1101791 #1101794 #1101800 #1101802 #1101804
#1101810 #1106514
Cross-References: CVE-2018-11354 CVE-2018-11355 CVE-2018-11356
CVE-2018-11357 CVE-2018-11358 CVE-2018-11359
CVE-2018-11360 CVE-2018-11361 CVE-2018-11362
CVE-2018-14339 CVE-2018-14340 CVE-2018-14341
CVE-2018-14342 CVE-2018-14343 CVE-2018-14344
CVE-2018-14367 CVE-2018-14368 CVE-2018-14369
CVE-2018-14370 CVE-2018-16056 CVE-2018-16057
CVE-2018-16058
Affected Products:
SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________
An update that fixes 22 vulnerabilities is now available.
Description:
This update for wireshark to version 2.4.9 fixes the following issues:
Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).
Security issues fixed:
- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash
(wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43,
bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40,
bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36,
bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38,
bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive
memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2051=1
Package List:
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
libwireshark9-2.4.9-48.29.1
libwireshark9-debuginfo-2.4.9-48.29.1
libwiretap7-2.4.9-48.29.1
libwiretap7-debuginfo-2.4.9-48.29.1
libwscodecs1-2.4.9-48.29.1
libwscodecs1-debuginfo-2.4.9-48.29.1
libwsutil8-2.4.9-48.29.1
libwsutil8-debuginfo-2.4.9-48.29.1
wireshark-2.4.9-48.29.1
wireshark-debuginfo-2.4.9-48.29.1
wireshark-debugsource-2.4.9-48.29.1
wireshark-gtk-2.4.9-48.29.1
wireshark-gtk-debuginfo-2.4.9-48.29.1
References:
https://www.suse.com/security/cve/CVE-2018-11354.html
https://www.suse.com/security/cve/CVE-2018-11355.html
https://www.suse.com/security/cve/CVE-2018-11356.html
https://www.suse.com/security/cve/CVE-2018-11357.html
https://www.suse.com/security/cve/CVE-2018-11358.html
https://www.suse.com/security/cve/CVE-2018-11359.html
https://www.suse.com/security/cve/CVE-2018-11360.html
https://www.suse.com/security/cve/CVE-2018-11361.html
https://www.suse.com/security/cve/CVE-2018-11362.html
https://www.suse.com/security/cve/CVE-2018-14339.html
https://www.suse.com/security/cve/CVE-2018-14340.html
https://www.suse.com/security/cve/CVE-2018-14341.html
https://www.suse.com/security/cve/CVE-2018-14342.html
https://www.suse.com/security/cve/CVE-2018-14343.html
https://www.suse.com/security/cve/CVE-2018-14344.html
https://www.suse.com/security/cve/CVE-2018-14367.html
https://www.suse.com/security/cve/CVE-2018-14368.html
https://www.suse.com/security/cve/CVE-2018-14369.html
https://www.suse.com/security/cve/CVE-2018-14370.html
https://www.suse.com/security/cve/CVE-2018-16056.html
https://www.suse.com/security/cve/CVE-2018-16057.html
https://www.suse.com/security/cve/CVE-2018-16058.html
https://bugzilla.suse.com/1094301
https://bugzilla.suse.com/1101776
https://bugzilla.suse.com/1101777
https://bugzilla.suse.com/1101786
https://bugzilla.suse.com/1101788
https://bugzilla.suse.com/1101791
https://bugzilla.suse.com/1101794
https://bugzilla.suse.com/1101800
https://bugzilla.suse.com/1101802
https://bugzilla.suse.com/1101804
https://bugzilla.suse.com/1101810
https://bugzilla.suse.com/1106514
More information about the sle-updates
mailing list