SUSE-SU-2018:2891-2: moderate: Security update for wireshark

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Oct 18 10:12:48 MDT 2018


   SUSE Security Update: Security update for wireshark
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2891-2
Rating:             moderate
References:         #1094301 #1101776 #1101777 #1101786 #1101788 
                    #1101791 #1101794 #1101800 #1101802 #1101804 
                    #1101810 #1106514 
Cross-References:   CVE-2018-11354 CVE-2018-11355 CVE-2018-11356
                    CVE-2018-11357 CVE-2018-11358 CVE-2018-11359
                    CVE-2018-11360 CVE-2018-11361 CVE-2018-11362
                    CVE-2018-14339 CVE-2018-14340 CVE-2018-14341
                    CVE-2018-14342 CVE-2018-14343 CVE-2018-14344
                    CVE-2018-14367 CVE-2018-14368 CVE-2018-14369
                    CVE-2018-14370 CVE-2018-16056 CVE-2018-16057
                    CVE-2018-16058
Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________

   An update that fixes 22 vulnerabilities is now available.

Description:

   This update for wireshark to version 2.4.9 fixes the following issues:

   Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

   Security issues fixed:

   - CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
   - CVE-2018-16056: Bluetooth Attribute Protocol dissector crash
     (wnpa-sec-2018-45)
   - CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
   - CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
   - CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43,
     bsc#1101802)
   - CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40,
     bsc#1101794)
   - CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
   - CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
   - CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
   - CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
   - CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
   - CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36,
     bsc#1101804)
   - CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
   - CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
   - CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
   - CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
   - CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
   - CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38,
     bsc#1101810)
   - CVE-2018-11357: Fix multiple dissectors that could consume excessive
     memory (bsc#1094301).
   - CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
   - CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
   - CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

   Further bug fixes and updated protocol support as listed in:
   https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2051=1



Package List:

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      libwireshark9-2.4.9-48.29.1
      libwireshark9-debuginfo-2.4.9-48.29.1
      libwiretap7-2.4.9-48.29.1
      libwiretap7-debuginfo-2.4.9-48.29.1
      libwscodecs1-2.4.9-48.29.1
      libwscodecs1-debuginfo-2.4.9-48.29.1
      libwsutil8-2.4.9-48.29.1
      libwsutil8-debuginfo-2.4.9-48.29.1
      wireshark-2.4.9-48.29.1
      wireshark-debuginfo-2.4.9-48.29.1
      wireshark-debugsource-2.4.9-48.29.1
      wireshark-gtk-2.4.9-48.29.1
      wireshark-gtk-debuginfo-2.4.9-48.29.1


References:

   https://www.suse.com/security/cve/CVE-2018-11354.html
   https://www.suse.com/security/cve/CVE-2018-11355.html
   https://www.suse.com/security/cve/CVE-2018-11356.html
   https://www.suse.com/security/cve/CVE-2018-11357.html
   https://www.suse.com/security/cve/CVE-2018-11358.html
   https://www.suse.com/security/cve/CVE-2018-11359.html
   https://www.suse.com/security/cve/CVE-2018-11360.html
   https://www.suse.com/security/cve/CVE-2018-11361.html
   https://www.suse.com/security/cve/CVE-2018-11362.html
   https://www.suse.com/security/cve/CVE-2018-14339.html
   https://www.suse.com/security/cve/CVE-2018-14340.html
   https://www.suse.com/security/cve/CVE-2018-14341.html
   https://www.suse.com/security/cve/CVE-2018-14342.html
   https://www.suse.com/security/cve/CVE-2018-14343.html
   https://www.suse.com/security/cve/CVE-2018-14344.html
   https://www.suse.com/security/cve/CVE-2018-14367.html
   https://www.suse.com/security/cve/CVE-2018-14368.html
   https://www.suse.com/security/cve/CVE-2018-14369.html
   https://www.suse.com/security/cve/CVE-2018-14370.html
   https://www.suse.com/security/cve/CVE-2018-16056.html
   https://www.suse.com/security/cve/CVE-2018-16057.html
   https://www.suse.com/security/cve/CVE-2018-16058.html
   https://bugzilla.suse.com/1094301
   https://bugzilla.suse.com/1101776
   https://bugzilla.suse.com/1101777
   https://bugzilla.suse.com/1101786
   https://bugzilla.suse.com/1101788
   https://bugzilla.suse.com/1101791
   https://bugzilla.suse.com/1101794
   https://bugzilla.suse.com/1101800
   https://bugzilla.suse.com/1101802
   https://bugzilla.suse.com/1101804
   https://bugzilla.suse.com/1101810
   https://bugzilla.suse.com/1106514



More information about the sle-updates mailing list