Bug 33121 - wireshark new security issue CVE-2024-2955
Summary: wireshark new security issue CVE-2024-2955
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-04-22 10:32 CEST by Nicolas Salguero
Modified: 2024-04-26 08:48 CEST (History)
4 users (show)

See Also:
Source RPM: wireshark-4.0.12-1.mga9.src.rpm
CVE: CVE-2024-2955
Status comment:


Attachments

Description Nicolas Salguero 2024-04-22 10:32:34 CEST
Fedora has issued an advisory on April 17:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZD2MNS6EW2K2SSMN4YBGPZCC47KBDNEE/

The problem is fixed in version 4.0.14.

Mageia 9 is also affected.
Nicolas Salguero 2024-04-22 10:33:00 CEST

Whiteboard: (none) => MGA9TOO
CVE: (none) => CVE-2024-2955
Status comment: (none) => Fixed upstream in 4.0.14
Source RPM: (none) => wireshark-4.0.12-1.mga9.src.rpm

Comment 1 Nicolas Salguero 2024-04-22 13:21:15 CEST
Suggested advisory:
========================

The updated packages fix a security vulnerability:

T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file. (CVE-2024-2955)

References:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZD2MNS6EW2K2SSMN4YBGPZCC47KBDNEE/
========================

Updated packages in core/updates_testing:
========================
dumpcap-4.0.14-1.mga9
lib(64)wireshark16-4.0.14-1.mga9
lib(64)wireshark-devel-4.0.14-1.mga9
lib(64)wiretap13-4.0.14-1.mga9
lib(64)wsutil14-4.0.14-1.mga9
rawshark-4.0.14-1.mga9
tshark-4.0.14-1.mga9
wireshark-4.0.14-1.mga9
wireshark-tools-4.0.14-1.mga9

from SRPM:
wireshark-4.0.14-1.mga9.src.rpm

Whiteboard: MGA9TOO => (none)
Status comment: Fixed upstream in 4.0.14 => (none)
Assignee: bugsquad => qa-bugs
Version: Cauldron => 9
Status: NEW => ASSIGNED

PC LX 2024-04-22 14:01:41 CEST

CC: (none) => mageia

katnatek 2024-04-22 20:55:09 CEST

Keywords: (none) => advisory

Comment 2 Len Lawrence 2024-04-25 13:42:41 CEST
Mageia9, x64

Followed the CVE trail to
https://gitlab.com/wireshark/wireshark/-/issues/19695
https://www.wireshark.org/download/automated/captures/fuzz-2024-03-07-7208.pcap.gz
Tried this command but left out the logging parameter because tshark did not recognise it - probably something introduced for the fuzzing/asan framework.
$ tshark -2  -nVxr fuzz-2024-03-07-7208.pcap.gz
That generated a lot of output including "malformed packet exception" messages.
This was before updating.

No problem installing with with qarepo, drakrpm-update.

Tried the PoC but was unable to draw any conclusions from the output - at least one malformed packet exception.

Referred to earlier bugs for testing, all based on https://wiki.mageia.org/en/QA_procedure:Wireshark.

$ wireshark -n lcl1.cap
generated the wireshark frame/capture analysis interface.

$ wireshark -i enp0s20f0u1 -w qa.cap --autostop duration:60 
 ** (wireshark:521126) 11:23:30.531431 [Capture MESSAGE] -- Capture Start ...
 ** (wireshark:521126) 11:23:30.556875 [Capture MESSAGE] -- Capture started
 ** (wireshark:521126) 11:23:30.556918 [Capture MESSAGE] -- File: "qa.cap"
 ** (wireshark:521126) 11:24:30.689064 [Capture MESSAGE] -- Capture stopped.
$ ll
-rw------- 1 lcl lcl   19144 Apr 25 11:24  qa.cap
$ wireshark qa.cap
102 packets displayed, protocols STP, ARP and TCP.  Several keep-alive packets and NOTIFY from the router and ARP conversations along the lines of "Who has <yildun>?" "Tell <canopus>" and "<yildun> is at <MAC address>".

$ tshark -nr qa.cap
dumps the same information to the terminal.

$ editcap -r qa.cap wiresharktest40 1-40
No terminal output.
$ ll wiresharktest40
-rw-r--r-- 1 lcl lcl 4088 Apr 25 11:46 wiresharktest40
$ mergecap -V -w merged qa.cap wiresharktest40
mergecap: qa.cap is type Wireshark/... - pcapng.
mergecap: wiresharktest40 is type Wireshark/... - pcapng.
mergecap: selected frame_type Ethernet (ether)
mergecap: ready to merge records
Record: 1
[...]
Record: 142
mergecap: merging complete
$ ll merged
-rw-r--r-- 1 lcl lcl 22816 Apr 25 12:23 merged

$ randpkt -b 500 -t dns wireshark_dns.pcap
This accumulated 1000 packets.  Wireshark showed that theye were all exchanges between two addresses whuch I did not recognise but which I guess are the DNS servers.

$ dftest ip
failed for lack of the dftest command.
Otherwise all looks good.

CC: (none) => tarazed25

Comment 3 Len Lawrence 2024-04-25 13:52:45 CEST
Tried the asan/fuzzing PoC file with tshark.  Copious output but I had not recorded the previous test output so cannot compare them.  Malformed packet exceptions were raised again.

Giving this an OK for 64 bits.

Whiteboard: (none) => MGA9-64-OK

Comment 4 Thomas Andrews 2024-04-26 01:33:52 CEST
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 5 Mageia Robot 2024-04-26 08:48:12 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0149.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.