| Summary: | wireshark new releases 1.6.16 and 1.8.8 fix security issues | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | luigiwalser, martynvidler, rverschelde, sysadmin-bugs |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/554059/ | ||
| Whiteboard: | MGA2TOO mga2-32-ok mga2-64-ok mga3-32-ok MGA3-64-ok | ||
| Source RPM: | wireshark | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-06-10 09:43:27 CEST
New versions has been uploaded for all. Packages built: wireshark-1.6.16-1.mga2 libwireshark1-1.6.16-1.mga2 libwireshark-devel-1.6.16-1.mga2 wireshark-tools-1.6.16-1.mga2 tshark-1.6.16-1.mga2 rawshark-1.6.16-1.mga2 dumpcap-1.6.16-1.mga2 wireshark-1.8.8-1.mga3 libwireshark2-1.8.8-1.mga3 libwireshark-devel-1.8.8-1.mga3 wireshark-tools-1.8.8-1.mga3 tshark-1.8.8-1.mga3 rawshark-1.8.8-1.mga3 dumpcap-1.8.8-1.mga3 from SRPMS: wireshark-1.6.16-1.mga2.src.rpm wireshark-1.8.8-1.mga3.src.rpm CC:
(none) =>
luigiwalser Upstream announcement from June 7: http://www.wireshark.org/news/20130607.html This hasn't yet been fixed in Cauldron, so waiting on that before pushing to QA. Mandriva has issued an advisory for this today (June 12): http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:172/
David Walser
2013-06-12 23:08:39 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/554059/ Updated packages uploaded for Mageia 2, Mageia 3, and Cauldron. Assigning to QA. Advisory (Mageia 2): ======================== Updated wireshark packages fix security vulnerabilities: The CAPWAP dissector could crash (CVE-2013-4074). The HTTP dissector could overrun the stack (CVE-2013-4081). The DCP ETSI dissector could crash (CVE-2013-4083). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083 http://www.wireshark.org/security/wnpa-sec-2013-32.html http://www.wireshark.org/security/wnpa-sec-2013-39.html http://www.wireshark.org/security/wnpa-sec-2013-41.html http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html http://www.wireshark.org/news/20130607.html http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:172/ ======================== Updated packages in core/updates_testing: ======================== wireshark-1.6.16-1.mga2 libwireshark1-1.6.16-1.mga2 libwireshark-devel-1.6.16-1.mga2 wireshark-tools-1.6.16-1.mga2 tshark-1.6.16-1.mga2 rawshark-1.6.16-1.mga2 dumpcap-1.6.16-1.mga2 from wireshark-1.6.16-1.mga2.src.rpm Advisory (Mageia 3): ======================== Updated wireshark packages fix security vulnerability: The CAPWAP dissector could crash (CVE-2013-4074). The GMR-1 BCCH dissector could crash (CVE-2013-4075). The PPP dissector could crash (CVE-2013-4076). The NBAP dissector could crash (CVE-2013-4077). The RDP dissector could crash (CVE-2013-4078). The GSM CBCH dissector could crash (CVE-2013-4079). The Assa Abloy R3 dissector could consume excessive memory and CPU (CVE-2013-4080). The HTTP dissector could overrun the stack (CVE-2013-4081). The Ixia IxVeriWave file parser could overflow the heap (CVE-2013-4082). The DCP ETSI dissector could crash (CVE-2013-4083). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4080 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083 http://www.wireshark.org/security/wnpa-sec-2013-32.html http://www.wireshark.org/security/wnpa-sec-2013-33.html http://www.wireshark.org/security/wnpa-sec-2013-34.html http://www.wireshark.org/security/wnpa-sec-2013-35.html http://www.wireshark.org/security/wnpa-sec-2013-36.html http://www.wireshark.org/security/wnpa-sec-2013-37.html http://www.wireshark.org/security/wnpa-sec-2013-38.html http://www.wireshark.org/security/wnpa-sec-2013-39.html http://www.wireshark.org/security/wnpa-sec-2013-40.html http://www.wireshark.org/security/wnpa-sec-2013-41.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html http://www.wireshark.org/news/20130607.html ======================== Updated packages in core/updates_testing: ======================== wireshark-1.8.8-1.mga3 libwireshark2-1.8.8-1.mga3 libwireshark-devel-1.8.8-1.mga3 wireshark-tools-1.8.8-1.mga3 tshark-1.8.8-1.mga3 rawshark-1.8.8-1.mga3 dumpcap-1.8.8-1.mga3 from wireshark-1.8.8-1.mga3.src.rpm Assignee:
bugsquad =>
qa-bugs Debian has issued an advisory for this on June 17: http://www.debian.org/security/2013/dsa-2709 from http://lwn.net/Vulnerabilities/555217/
David Walser
2013-06-20 21:53:51 CEST
Version:
2 =>
3 update is ok here Whiteboard:
MGA2TOO =>
MGA2TOO mga2-64-ok Testing complete on mga3 i586, following https://wiki.mageia.org/en/QA_procedure:Wireshark CC:
(none) =>
remi Testing complete on mga2 i586 (VM). Whiteboard:
MGA2TOO mga2-64-ok mga3-32-ok =>
MGA2TOO mga2-32-ok mga2-64-ok mga3-32-ok Tested MGA3 64 Completed test as https://wiki.mageia.org/en/QA_procedure:Wireshark CC:
(none) =>
martynvidler Validating the update candidate then. -- Please push this update from Mageia 2 and Mageia 3. The advisory and list of RPMs/SRPM is in comment 5. Keywords:
(none) =>
validated_update (btw we keep bugs assigned to the qa) Assignee:
sysadmin-bugs =>
qa-bugs Advisories uploaded http://advisories.mageia.org/MGASA-2013-0180.html http://advisories.mageia.org/MGASA-2013-0181.html Status:
NEW =>
RESOLVED
Nicolas Vigier
2014-05-08 18:05:57 CEST
CC:
boklm =>
(none) |