ALT-BU-2018-3192-1
Branch p8 update bulletin.
Package ceph-deploy updated to version 1.5.39-alt1.M80P.1 for branch p8 in task 203558.
Closed bugs
попытка удалить несущесвующий пакет приводит к ошибке
Package kernel-image-std-def updated to version 4.9.93-alt0.M80P.1 for branch p8 in task 203749.
Closed vulnerabilities
BDU:2018-00001
Уязвимость процессоров Intel и АRM, вызванная ошибкой контроля доступа к памяти при спекулятивном выполнении инструкций процессора, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
- SUSE-SU-2018:0010
- SUSE-SU-2018:0010
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- SUSE-SU-2018:0012
- SUSE-SU-2018:0012
- openSUSE-SU-2018:0022
- openSUSE-SU-2018:0022
- openSUSE-SU-2018:0023
- openSUSE-SU-2018:0023
- http://nvidia.custhelp.com/app/answers/detail/a_id/4609
- http://nvidia.custhelp.com/app/answers/detail/a_id/4609
- http://nvidia.custhelp.com/app/answers/detail/a_id/4611
- http://nvidia.custhelp.com/app/answers/detail/a_id/4611
- http://nvidia.custhelp.com/app/answers/detail/a_id/4613
- http://nvidia.custhelp.com/app/answers/detail/a_id/4613
- http://nvidia.custhelp.com/app/answers/detail/a_id/4614
- http://nvidia.custhelp.com/app/answers/detail/a_id/4614
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- VU#584653
- VU#584653
- 102378
- 102378
- 106128
- 106128
- 1040071
- 1040071
- http://xenbits.xen.org/xsa/advisory-254.html
- http://xenbits.xen.org/xsa/advisory-254.html
- RHSA-2018:0292
- RHSA-2018:0292
- https://access.redhat.com/security/vulnerabilities/speculativeexecution
- https://access.redhat.com/security/vulnerabilities/speculativeexecution
- https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
- https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
- https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
- https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
- https://cdrdv2.intel.com/v1/dl/getContent/685358
- https://cdrdv2.intel.com/v1/dl/getContent/685358
- https://cert.vde.com/en-us/advisories/vde-2018-002
- https://cert.vde.com/en-us/advisories/vde-2018-002
- https://cert.vde.com/en-us/advisories/vde-2018-003
- https://cert.vde.com/en-us/advisories/vde-2018-003
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
- https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
- https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- https://meltdownattack.com/
- https://meltdownattack.com/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
- FreeBSD-SA-18:03
- FreeBSD-SA-18:03
- GLSA-201810-06
- GLSA-201810-06
- https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
- https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
- https://security.netapp.com/advisory/ntap-20180104-0001/
- https://security.netapp.com/advisory/ntap-20180104-0001/
- https://source.android.com/security/bulletin/2018-04-01
- https://source.android.com/security/bulletin/2018-04-01
- https://support.citrix.com/article/CTX231399
- https://support.citrix.com/article/CTX231399
- https://support.citrix.com/article/CTX234679
- https://support.citrix.com/article/CTX234679
- https://support.f5.com/csp/article/K91229003
- https://support.f5.com/csp/article/K91229003
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
- https://support.lenovo.com/us/en/solutions/LEN-18282
- https://support.lenovo.com/us/en/solutions/LEN-18282
- 20180104 CPU Side-Channel Information Disclosure Vulnerabilities
- 20180104 CPU Side-Channel Information Disclosure Vulnerabilities
- USN-3522-3
- USN-3522-3
- USN-3522-4
- USN-3522-4
- USN-3523-1
- USN-3523-1
- USN-3540-2
- USN-3540-2
- USN-3541-2
- USN-3541-2
- USN-3583-1
- USN-3583-1
- USN-3597-1
- USN-3597-1
- USN-3597-2
- USN-3597-2
- USN-3516-1
- USN-3516-1
- USN-3522-2
- USN-3522-2
- USN-3523-2
- USN-3523-2
- USN-3524-2
- USN-3524-2
- USN-3525-1
- USN-3525-1
- https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin
- https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin
- DSA-4078
- DSA-4078
- DSA-4082
- DSA-4082
- DSA-4120
- DSA-4120
- VU#180049
- VU#180049
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
- https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
- https://www.synology.com/support/security/Synology_SA_18_01
- https://www.synology.com/support/security/Synology_SA_18_01
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-5334
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
- 102499
- 102499
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14297
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14297
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc308c05ba0673460fe80873b22d296880ee996d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc308c05ba0673460fe80873b22d296880ee996d
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- DSA-4101
- DSA-4101
- https://www.wireshark.org/security/wnpa-sec-2018-03.html
- https://www.wireshark.org/security/wnpa-sec-2018-03.html
Modified: 2024-11-21
CVE-2018-5335
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
- 102500
- 102500
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14251
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14251
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086b87376b988c555484349aa115d6e08ac6db07
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086b87376b988c555484349aa115d6e08ac6db07
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- DSA-4101
- DSA-4101
- https://www.wireshark.org/security/wnpa-sec-2018-04.html
- https://www.wireshark.org/security/wnpa-sec-2018-04.html
Modified: 2024-11-21
CVE-2018-5336
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.
- 102504
- 102504
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14253
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14253
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f4c95cf46ba6adbd10b09747e10742801bc706b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f4c95cf46ba6adbd10b09747e10742801bc706b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f6702e49a9720d173246668495eece6d77eca5b0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f6702e49a9720d173246668495eece6d77eca5b0
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- DSA-4101
- DSA-4101
- https://www.wireshark.org/security/wnpa-sec-2018-01.html
- https://www.wireshark.org/security/wnpa-sec-2018-01.html
Modified: 2024-11-21
CVE-2018-6836
The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397
- https://code.wireshark.org/review/#/c/25660/
- https://code.wireshark.org/review/#/c/25660/
- https://code.wireshark.org/review/#/c/25660/2/wiretap/netmon.c
- https://code.wireshark.org/review/#/c/25660/2/wiretap/netmon.c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=28960d79cca262ac6b974f339697b299a1e28fef
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=28960d79cca262ac6b974f339697b299a1e28fef
Modified: 2024-11-21
CVE-2018-7320
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
- 103160
- 103160
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14398
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14398
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=015e3399390b8b5cfbfcfcda30589983ab6cc129
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=015e3399390b8b5cfbfcfcda30589983ab6cc129
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-10.html
- https://www.wireshark.org/security/wnpa-sec-2018-10.html
Modified: 2024-11-21
CVE-2018-7321
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7322
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14411
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14411
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afc780e2c796e971bb7d164103f4f0d10d3c25b5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afc780e2c796e971bb7d164103f4f0d10d3c25b5
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7323
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14412
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14412
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f9199ea8cff56c6704e9828c3d80360b27c4565
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f9199ea8cff56c6704e9828c3d80360b27c4565
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5d45b69b590cabc5127282d1ade3bca1598e5f5c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5d45b69b590cabc5127282d1ade3bca1598e5f5c
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7324
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14413
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14413
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9e7695bbee18525eaa6d12b32230313ae8a36a81
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9e7695bbee18525eaa6d12b32230313ae8a36a81
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7325
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7326
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14419
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14419
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=293b999425e998d6cde0d9149648e421ea7687d0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=293b999425e998d6cde0d9149648e421ea7687d0
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7327
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7328
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14421
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14421
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69d09028c956f6e049145485ce9b3e2858789b2b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69d09028c956f6e049145485ce9b3e2858789b2b
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7329
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14423
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14423
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d8a0cbc4f2979e0b1cadbe79f0b8b4ecb92477be
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d8a0cbc4f2979e0b1cadbe79f0b8b4ecb92477be
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7330
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7331
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7332
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14445
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14445
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1ab0585098c7ce20f3afceb6730427cc2a1e98ea
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1ab0585098c7ce20f3afceb6730427cc2a1e98ea
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7333
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bd6313181317bfe83842b27650b65f3c2b8d5dc9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bd6313181317bfe83842b27650b65f3c2b8d5dc9
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7334
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
- 103162
- 103162
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14339
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14339
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed705e1227d3d582e3f0de435bba606d053d686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed705e1227d3d582e3f0de435bba606d053d686
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-07.html
- https://www.wireshark.org/security/wnpa-sec-2018-07.html
Modified: 2024-11-21
CVE-2018-7335
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
- 103165
- 103165
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14442
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14442
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2901dcf45c9f1b07abfbf2a0b0cd654371d72a4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2901dcf45c9f1b07abfbf2a0b0cd654371d72a4
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-05.html
- https://www.wireshark.org/security/wnpa-sec-2018-05.html
Modified: 2024-11-21
CVE-2018-7336
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
- 103166
- 103166
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14374
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14374
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b56f598f1bc04f5d00f13b38c713763928cedb7c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b56f598f1bc04f5d00f13b38c713763928cedb7c
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-09.html
- https://www.wireshark.org/security/wnpa-sec-2018-09.html
Modified: 2024-11-21
CVE-2018-7337
In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
- 103164
- 103164
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14446
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14446
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=511a8b0b546d25413e289dc5a7d3a455a33994c2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=511a8b0b546d25413e289dc5a7d3a455a33994c2
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-08.html
- https://www.wireshark.org/security/wnpa-sec-2018-08.html
Modified: 2024-11-21
CVE-2018-7417
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.
- 103156
- 103156
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14409
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14409
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81216a176b25dd8a616e11808a951e141a467009
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81216a176b25dd8a616e11808a951e141a467009
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-12.html
- https://www.wireshark.org/security/wnpa-sec-2018-12.html
Modified: 2024-11-21
CVE-2018-7418
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
- 103157
- 103157
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14410
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14410
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=29d920b8309905dda11ad397596fe8aafc9b4bf7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=29d920b8309905dda11ad397596fe8aafc9b4bf7
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-13.html
- https://www.wireshark.org/security/wnpa-sec-2018-13.html
Modified: 2024-11-21
CVE-2018-7419
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.
- 103159
- 103159
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14443
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14443
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bebd3a1f50b0a27738d8d3da5b33c1b392eb7273
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bebd3a1f50b0a27738d8d3da5b33c1b392eb7273
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-14.html
- https://www.wireshark.org/security/wnpa-sec-2018-14.html
Modified: 2024-11-21
CVE-2018-7420
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.
- 103163
- 103163
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-11.html
- https://www.wireshark.org/security/wnpa-sec-2018-11.html
Modified: 2024-11-21
CVE-2018-7421
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14408
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14408
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=656812ee1f2a8ddfd383b02a066e888f5919e17a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=656812ee1f2a8ddfd383b02a066e888f5919e17a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e8be5adae469ba563acfad2c2b98673e1afaf901
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e8be5adae469ba563acfad2c2b98673e1afaf901
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-9256
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the LWAPP dissector could crash. This was addressed in epan/dissectors/packet-lwapp.c by limiting the encapsulation levels to restrict the recursion depth.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dac48f148538c706c446e5105d84ebcb54587528
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dac48f148538c706c446e5105d84ebcb54587528
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-20.html
- https://www.wireshark.org/security/wnpa-sec-2018-20.html
Modified: 2024-11-21
CVE-2018-9257
In Wireshark 2.4.0 to 2.4.5, the CQL dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-cql.c by checking for a nonzero number of columns.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14530
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14530
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d7a9501b0439a5dbf24016a95b4896170d789dc2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d7a9501b0439a5dbf24016a95b4896170d789dc2
- https://www.wireshark.org/security/wnpa-sec-2018-22.html
- https://www.wireshark.org/security/wnpa-sec-2018-22.html
Modified: 2024-11-21
CVE-2018-9258
In Wireshark 2.4.0 to 2.4.5, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by preserving valid data sources.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14472
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14472
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2d4695de1477df60b0188fd581c0c279db601978
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2d4695de1477df60b0188fd581c0c279db601978
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-21.html
- https://www.wireshark.org/security/wnpa-sec-2018-21.html
Modified: 2024-11-21
CVE-2018-9259
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the MP4 dissector could crash. This was addressed in epan/dissectors/file-mp4.c by restricting the box recursion depth.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2113179835b37549f245ac7c05ff2b96276893e4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2113179835b37549f245ac7c05ff2b96276893e4
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-15.html
- https://www.wireshark.org/security/wnpa-sec-2018-15.html
Modified: 2024-11-21
CVE-2018-9260
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the IEEE 802.15.4 dissector could crash. This was addressed in epan/dissectors/packet-ieee802154.c by ensuring that an allocation step occurs.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=14d6f717d8ea27688af48532edb1d29f502ea8f0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=14d6f717d8ea27688af48532edb1d29f502ea8f0
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-17.html
- https://www.wireshark.org/security/wnpa-sec-2018-17.html
Modified: 2024-11-21
CVE-2018-9261
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the NBAP dissector could crash with a large loop that ends with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-nbap.c by prohibiting the self-linking of DCH-IDs.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66bc372716e04d6a8afdf6712583c9b5d11fee55
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66bc372716e04d6a8afdf6712583c9b5d11fee55
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-18.html
- https://www.wireshark.org/security/wnpa-sec-2018-18.html
Modified: 2024-11-21
CVE-2018-9262
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the VLAN dissector could crash. This was addressed in epan/dissectors/packet-vlan.c by limiting VLAN tag nesting to restrict the recursion depth.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f05c3b91f9571210b86576ee6284e71a3306109d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f05c3b91f9571210b86576ee6284e71a3306109d
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-19.html
- https://www.wireshark.org/security/wnpa-sec-2018-19.html
Modified: 2024-11-21
CVE-2018-9263
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the Kerberos dissector could crash. This was addressed in epan/dissectors/packet-kerberos.c by ensuring a nonzero key length.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4fe65168fd0de81306710330aa414f10f53cbdf0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4fe65168fd0de81306710330aa414f10f53cbdf0
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-23.html
- https://www.wireshark.org/security/wnpa-sec-2018-23.html
Modified: 2024-11-21
CVE-2018-9264
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the ADB dissector could crash with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-adb.c by checking for a length inconsistency.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0290a62be0fca8da9bb190f59dc1fe26c1d65024
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0290a62be0fca8da9bb190f59dc1fe26c1d65024
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-16.html
- https://www.wireshark.org/security/wnpa-sec-2018-16.html
Modified: 2024-11-21
CVE-2018-9265
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-tn3270.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b12cc581cd4878d74b6116ca02c7dbe650c1f242
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b12cc581cd4878d74b6116ca02c7dbe650c1f242
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9266
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-isup.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9d3714e767cb104dcfa1647935fa5960b16bb8e1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9d3714e767cb104dcfa1647935fa5960b16bb8e1
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9267
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-lapd.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed057f7faa709dbde34b91f0715a957837f74d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed057f7faa709dbde34b91f0715a957837f74d9
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9268
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-smb2.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c69d710d2bf39fe633800db65efddf55701131b6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c69d710d2bf39fe633800db65efddf55701131b6
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9269
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-giop.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e19aba33026212cbe000ece633adf14d109489fa
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e19aba33026212cbe000ece633adf14d109489fa
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9270
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/oids.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fbc50f9b9219be54d6db47f04b65af19696a7c7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fbc50f9b9219be54d6db47f04b65af19696a7c7
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9271
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-multipart.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b0228945dc74ee82d2ab4a4e7af2bdfe7b75910
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b0228945dc74ee82d2ab4a4e7af2bdfe7b75910
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9272
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-h223.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e3b90824a82724f445a0374e99f0b76e4cf5e8b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e3b90824a82724f445a0374e99f0b76e4cf5e8b
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9273
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1f8f1456f1e73b6c09e50a64749e43413ac12df7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1f8f1456f1e73b6c09e50a64749e43413ac12df7
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9274
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, ui/failure_message.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=211845aba4794720ae265c782cdffddae54a3e7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=211845aba4794720ae265c782cdffddae54a3e7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f38e895dfc0d97bce64f73ce99df706911d9aa07
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f38e895dfc0d97bce64f73ce99df706911d9aa07
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html