Upstream has released new versions on August 29: https://www.wireshark.org/news/20180829.html Updated package uploaded for Mageia 6. Advisory: ======================== Updated wireshark packages fix security vulnerabilities: Bluetooth Attribute Protocol dissector crash (CVE-2018-16056). Radiotap dissector crash (CVE-2018-16057). Bluetooth AVDTP dissector crash (CVE-2018-16058). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058 https://www.wireshark.org/security/wnpa-sec-2018-44.html https://www.wireshark.org/security/wnpa-sec-2018-45.html https://www.wireshark.org/security/wnpa-sec-2018-46.html https://www.wireshark.org/docs/relnotes/wireshark-2.2.17.html https://www.wireshark.org/news/20180829.html ======================== Updated packages in core/updates_testing: ======================== wireshark-2.2.17-1.mga6 libwireshark8-2.2.17-1.mga6 libwiretap6-2.2.17-1.mga6 libwscodecs1-2.2.17-1.mga6 libwsutil7-2.2.17-1.mga6 libwireshark-devel-2.2.17-1.mga6 wireshark-tools-2.2.17-1.mga6 tshark-2.2.17-1.mga6 rawshark-2.2.17-1.mga6 dumpcap-2.2.17-1.mga6 from wireshark-2.2.17-1.mga6.src.rpm
Testing procedure: https://wiki.mageia.org/en/QA_procedure:Wireshark
Keywords: (none) => has_procedure
CC: (none) => tmbKeywords: (none) => advisory
Installed and tested without issues. Tests included: - Procedure in comment 1. - Using GUI and CLI tools. - Loading and filtering existing pcap files. - Capturing and filtering DNS traffic. - Capturing and filtering HTTP(S) traffic. - Capturing and filtering IMAP/POP/SMTP traffic. System: Mageia 6, x86_64, Plasma DE, Intel CPU, nVidia GPU using nvidia340 proprietary driver. $ uname -a Linux marte 4.14.65-desktop-1.mga6 #1 SMP Sat Aug 18 14:50:29 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux $ lspcidrake | grep NET r8169 : Realtek Semiconductor Co., Ltd.|RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller [NETWORK_ETHERNET] (rev: 02) $ rpm -qa | grep 2.2.17-1 | sort dumpcap-2.2.17-1.mga6 lib64wireshark8-2.2.17-1.mga6 lib64wiretap6-2.2.17-1.mga6 lib64wscodecs1-2.2.17-1.mga6 lib64wsutil7-2.2.17-1.mga6 wireshark-2.2.17-1.mga6 wireshark-tools-2.2.17-1.mga6
CC: (none) => mageiaWhiteboard: (none) => MGA6-64-OK
In VirtualBox, M6, MATE, 32-bit Package(s) under test: wireshark libwireshark8 libwiretap6 libwsutil7 wireshark-tools tshark The following 16 packages are going to be installed: - dumpcap-2.2.16-1.mga6.i586 - geoip-database-1.6.9-2.mga6.noarch - libgeoip1-1.6.9-2.mga6.i586 - libnl-route3_200-3.3.0-1.mga6.i586 - libqt5multimedia5-5.9.4-1.mga6.i586 - libqt5printsupport5-5.9.4-1.1.mga6.i586 - libsmi-mibs-std-0.5.0-2.mga6.i586 - libsmi2-0.5.0-2.mga6.i586 - libwireshark8-2.2.16-1.mga6.i586 - libwiretap6-2.2.16-1.mga6.i586 - libwscodecs1-2.2.16-1.mga6.i586 - libwsutil7-2.2.16-1.mga6.i586 - smi-tools-0.5.0-2.mga6.i586 - tshark-2.2.16-1.mga6.i586 - wireshark-2.2.16-1.mga6.i586 - wireshark-tools-2.2.16-1.mga6.i586 Assign wilcal to the wireshark group, restart wilcal. default install of : [root@localhost wilcal]# urpmi wireshark Package wireshark-2.2.16-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi libwireshark8 Package libwireshark8-2.2.16-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi libwiretap6 Package libwiretap6-2.2.16-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi libwsutil7 Package libwsutil7-2.2.16-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi wireshark-tools Package wireshark-tools-2.2.16-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi tshark Package tshark-2.2.16-1.mga6.i586 is already installed Running wireshark I can capture and save to a file (test01.pcapng) the traffic on enp0s3. Close wireshark. I can reopen test01.pcapng with wireshark and review the data. wireshark tools like tshark work: tshark >> test02.txt works Capturing on 'enp0s3' 3806 ^Z ( captured lines ) [1]+ Stopped tshark >> test02.txt Set a filter: ip.src == 192.168.0.10 ( this system ) ip.addr == 192.168.0.13 ( Yamaha receiver, barks a lot ) Set filter to: not ip.addr == 192.168.0.10 and not ip.src == 192.168.0.13 Filter works. install wireshark libwireshark8 libwiretap6 libwsutil7 wireshark-tools tshark from updates_testing [root@localhost wilcal]# urpmi wireshark Package wireshark-2.2.17-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi libwireshark8 Package libwireshark8-2.2.17-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi libwiretap6 Package libwiretap6-2.2.17-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi libwsutil7 Package libwsutil7-2.2.17-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi wireshark-tools Package wireshark-tools-2.2.17-1.mga6.i586 is already installed [root@localhost wilcal]# urpmi tshark Package tshark-2.2.17-1.mga6.i586 is already installed Running wireshark I can capture and save to a file (test03.pcapng) the traffic on enp0s3. Close wireshark. I can reopen test03.pcapng with wireshark and review the data. wireshark tools like tshark work: tshark >> test04.txt works Capturing on 'enp0s3' 8792 ^Z ( captured lines ) [1]+ Stopped tshark >> test02.txt Set a filter: Set filter to: not ip.addr == 192.168.0.10 and not ip.src == 192.168.0.13 Filter works.
CC: (none) => wilcal.int
Good to go
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Whiteboard: MGA6-64-OK => MGA6-32-OK MGA6-64-OK
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2018-0370.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED