Upstream has released new versions on February 10: https://www.wireshark.org/news/20220210.html Updated package uploaded for Mageia 8. Advisory: ======================== Updated wireshark packages fix security vulnerabilities: Kafka dissector infinite loop (CVE-2021-4190). RTMPT dissector infinite loop (wnpa-sec-2022-01). Large loops in multiple dissectors (wnpa-sec-2022-02). PVFS dissector crash (wnpa-sec-2022-03). CSN.1 dissector crash (wnpa-sec-2022-04). CMS dissector crash (wnpa-sec-2022-05). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190 https://www.wireshark.org/security/wnpa-sec-2021-22 https://www.wireshark.org/security/wnpa-sec-2022-01 https://www.wireshark.org/security/wnpa-sec-2022-02 https://www.wireshark.org/security/wnpa-sec-2022-03 https://www.wireshark.org/security/wnpa-sec-2022-04 https://www.wireshark.org/security/wnpa-sec-2022-05 https://www.wireshark.org/docs/relnotes/wireshark-3.4.12.html https://www.wireshark.org/news/20220210.html ======================== Updated packages in core/updates_testing: ======================== wireshark-3.4.12-1.mga8 libwireshark-devel-3.4.12-1.mga8 wireshark-tools-3.4.12-1.mga8 libwiretap11-3.4.12-1.mga8 tshark-3.4.12-1.mga8 dumpcap-3.4.12-1.mga8 rawshark-3.4.12-1.mga8 libwsutil12-3.4.12-1.mga8 libwireshark14-3.4.12-1.mga8 from wireshark-3.4.12-1.mga8.src.rpm
Testing procedure: https://wiki.mageia.org/en/QA_procedure:Wireshark
Keywords: (none) => has_procedure
MGA8-64 Plasma on Lenovo B50 in Dutch No installation issues Followed my previous bug 29832 $ wireshark -n -w wiresharktest.pcapng file saved OK $ tshark -nr wiresharktest.pcapng | more 1 0.000000000 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 2 0.000000049 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 3 1.945630182 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 4 1.945630231 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 5 3.993723335 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 6 3.993723386 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 7 5.939347475 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 8 5.939347525 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 9 7.987440447 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 10 7.987440496 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 11 9.933232173 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 12 9.933232220 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 13 10.752079634 192.168.2.15 → 224.0.0.1 IGMPv3 50 Membership Query, general 14 11.059566950 192.168.2.15 → 192.168.2.255 BROWSER 251 Host Announcement VIA8ENE9, Server 15 11.981276316 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 16 11.981276365 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 17 14.029369411 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 18 14.029369460 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 19 15.974929746 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 20 15.974929795 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 21 18.022995279 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 22 18.022995329 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 23 19.968552313 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 24 19.968552362 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 25 22.016729874 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 26 22.016729923 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 27 23.962364451 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 28 23.962364500 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 29 26.010444090 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff HomePlug AV 60 Qualcomm Atheros, GET_SW.REQ (Get Device/SW Version Request) 30 26.010444139 34:31:c4:80:a9:b4 → ff:ff:ff:ff:ff:ff 0x8912 60 Ethernet II 31 26.407246005 192.168.2.5 → 192.168.2.1 DNS 75 Standard query 0xb0d7 A apis.google.com 32 26.407280274 192.168.2.5 → 192.168.2.1 DNS 75 Standard query 0xc6de AAAA apis.google.com 33 26.407539698 192.168.2.5 → 192.168.2.1 DNS 79 Standard query 0x9e01 A adservice.google.be and more ...... $ editcap -r wiresharktest.pcapng wiresharktest50 1-50 $ mergecap -v -w wiresharkmerged wiresharktest.pcapng wiresharktest50 mergecap: wiresharktest.pcapng is type Wireshark/... - pcapng. mergecap: wiresharktest50 is type Wireshark/... - pcapng. mergecap: selected frame_type Ethernet (ether) mergecap: ready to merge records Record: 1 Record: 2 Record: 3 Record: 4 etc .... until at the end Record: 5015 Record: 5016 Record: 5017 mergecap: merging complete $ randpkt -b 500 -t dns wireshark_dns.pcap $ capinfos wiresharktest50 File name: wiresharktest50 File type: Wireshark/... - pcapng File encapsulation: Ethernet File timestamp precision: nanoseconds (9) Packet size limit: file hdr: (not set) Number of packets: 50 File size: 11kB Data size: 9.583 bytes Capture duration: 26,467842644 seconds First packet time: 2022-02-15 13:33:34,867386186 Last packet time: 2022-02-15 13:34:01,335228830 Data byte rate: 362 bytes/s Data bit rate: 2.896 bits/s Average packet size: 191,66 bytes Average packet rate: 1 packets/s SHA256: 5a3585a7f078d616ba6f0eeb06a7639e5e0f202fae0841874fc86360601fbb3e RIPEMD160: 3fc1610686fd9e9bebcdc7de7d42f3995f1d30d5 SHA1: 86b6e4c2c629c6890de62c8cbe02bca9196ae786 Strict time order: True Capture hardware: Intel(R) Core(TM) i5-5200U CPU @ 2.20GHz (with SSE4.2) Capture oper-sys: Linux 5.15.23-server-1.mga8 Capture application: Dumpcap (Wireshark) 3.4.12 (Git commit 398502390084) Number of interfaces in file: 1 Interface #0 info: Name = wlp9s0 Encapsulation = Ethernet (1 - ether) Capture length = 262144 Time precision = nanoseconds (9) Time ticks per second = 1000000000 Time resolution = 0x09 Operating system = Linux 5.15.23-server-1.mga8 Number of stat entries = 0 Number of packets = 50 All results are in line with previous updates.
CC: (none) => herman.viaeneWhiteboard: (none) => MGA8-64-OK
Validating. Advisory in Comment 0.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
CC: (none) => davidwhodginsKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0068.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED