Bug 15429 - wireshark new release 1.10.13 fixes security issues
Summary: wireshark new release 1.10.13 fixes security issues
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/636686/
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK a...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-03-05 01:39 CET by David Walser
Modified: 2015-03-27 22:13 CET (History)
3 users (show)

See Also:
Source RPM: wireshark-1.10.12-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-03-05 01:39:46 CET
Upstream has released new versions today (March 4):
https://www.wireshark.org/news/20150304.html

Freeze push requested for Cauldron for 1.12.4.

Updated package uploaded for Mageia 4.

Advisory:
========================

Updated wireshark packages fix security vulnerabilities:

The WCP dissector could crash (CVE-2015-2188).

The pcapng file parser could crash (CVE-2015-2189).

The TNEF dissector could go into an infinite loop (CVE-2015-2191).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191
https://www.wireshark.org/security/wnpa-sec-2015-07.html
https://www.wireshark.org/security/wnpa-sec-2015-08.html
https://www.wireshark.org/security/wnpa-sec-2015-10.html
https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html
https://www.wireshark.org/news/20150304.html
========================

Updated packages in core/updates_testing:
========================
wireshark-1.10.13-1.mga4
libwireshark3-1.10.13-1.mga4
libwiretap3-1.10.13-1.mga4
libwsutil3-1.10.13-1.mga4
libwireshark-devel-1.10.13-1.mga4
wireshark-tools-1.10.13-1.mga4
tshark-1.10.13-1.mga4
rawshark-1.10.13-1.mga4
dumpcap-1.10.13-1.mga4

from wireshark-1.10.13-1.mga4.src.rpm

Reproducible: 

Steps to Reproduce:
Comment 1 David Walser 2015-03-05 01:40:03 CET
Testing procedure:
https://wiki.mageia.org/en/QA_procedure:Wireshark

Whiteboard: (none) => has_procedure

David Walser 2015-03-05 01:40:30 CET

Version: Cauldron => 4

Comment 2 David Walser 2015-03-06 19:52:11 CET
Opened the 3 PoC files and scrolled through all the packets in Wireshark, no issues.  Did a capture and analysis, worked fine.  Testing complete Mageia 4 i586.

Whiteboard: has_procedure => has_procedure MGA4-32-OK

Comment 3 David Walser 2015-03-13 16:06:11 CET
OpenSuSE has issued an advisory for this today (March 13):
http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html

URL: (none) => http://lwn.net/Vulnerabilities/636686/

Comment 4 William Kenney 2015-03-27 15:24:28 CET
In VirtualBox, M4, KDE, 64-bit

Package(s) under test:
wireshark lib64wireshark3

default install of wireshark & lib64wireshark3

[root@localhost wilcal]# urpmi wireshark
Package wireshark-1.10.12-1.mga4.x86_64 is already installed
[root@localhost wilcal]# urpmi lib64wireshark3
Package lib64wireshark3-1.10.12-1.mga4.x86_64 is already installed

Running wireshark I can capture and save to a file all the traffic on
enp0s3. And then open that previously created file and review the data.

install wireshark from updates_testing

[root@localhost wilcal]# urpmi wireshark
Package wireshark-1.10.13-1.mga4.x86_64 is already installed
[root@localhost wilcal]# urpmi lib64wireshark3
Package lib64wireshark3-1.10.13-1.mga4.x86_64 is already installed

Running wireshark I can capture and save to a file all the traffic on
enp0s3. And then open that previously created file and review the data.

Test platform:
Intel Core i7-2600K Sandy Bridge 3.4GHz
GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo
GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB
RTL8111/8168B PCI Express 1Gbit Ethernet
DRAM 16GB (4 x 4GB)
Mageia 4 64-bit, Nvidia driver
VirtualBox 4.3.6-1.mga4.x86_64.rpm

CC: (none) => wilcal.int
Whiteboard: has_procedure MGA4-32-OK => has_procedure MGA4-32-OK MGA4-64-OK

Comment 5 William Kenney 2015-03-27 15:25:13 CET
This update works fine.
Testing complete for mga4 32-bit & 64-bit
Validating the update.
Could someone from the sysadmin team push this to updates.
Thanks

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Dave Hodgins 2015-03-27 16:57:12 CET

CC: (none) => davidwhodgins
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK => has_procedure MGA4-32-OK MGA4-64-OK advisory

Comment 6 Mageia Robot 2015-03-27 22:13:09 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0117.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.