ALT-BU-2018-3370-1
Branch p8 update bulletin.
Package codeblocks updated to version 17.12-alt3.M80P.1 for branch p8 in task 210571.
Closed bugs
Запрос на сборку новой версии
Патч для сборки FortranProject plugin
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-14339
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b77c0a596a8071aebc1de71e3f79e5e15e919ca
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b77c0a596a8071aebc1de71e3f79e5e15e919ca
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-38.html
- https://www.wireshark.org/security/wnpa-sec-2018-38.html
Modified: 2024-11-21
CVE-2018-14340
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=672d882a53f96730e4ef1e5b1639c585823b0df8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=672d882a53f96730e4ef1e5b1639c585823b0df8
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-36.html
- https://www.wireshark.org/security/wnpa-sec-2018-36.html
Modified: 2024-11-21
CVE-2018-14341
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e716c32be6aa20e1813b0002878853e71f8b2f4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e716c32be6aa20e1813b0002878853e71f8b2f4
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-39.html
- https://www.wireshark.org/security/wnpa-sec-2018-39.html
Modified: 2024-11-21
CVE-2018-14342
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=36af43dbb7673495948cd65d0346e8b9812b941c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=36af43dbb7673495948cd65d0346e8b9812b941c
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-34.html
- https://www.wireshark.org/security/wnpa-sec-2018-34.html
Modified: 2024-11-21
CVE-2018-14343
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9402f2f80c6bc7d25178a0875c5a1f5ee36361db
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9402f2f80c6bc7d25178a0875c5a1f5ee36361db
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-37.html
- https://www.wireshark.org/security/wnpa-sec-2018-37.html
Modified: 2024-11-21
CVE-2018-14344
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f7153685b39a164aea09ba7f96ebb648b8328ae
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f7153685b39a164aea09ba7f96ebb648b8328ae
- https://www.wireshark.org/security/wnpa-sec-2018-35.html
- https://www.wireshark.org/security/wnpa-sec-2018-35.html
Modified: 2024-11-21
CVE-2018-14367
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310
- https://www.wireshark.org/security/wnpa-sec-2018-42.html
- https://www.wireshark.org/security/wnpa-sec-2018-42.html
Modified: 2024-11-21
CVE-2018-14368
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-40.html
- https://www.wireshark.org/security/wnpa-sec-2018-40.html
Modified: 2024-11-21
CVE-2018-14369
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=038cd225bfa54e2a7ade4043118796334920a61e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=038cd225bfa54e2a7ade4043118796334920a61e
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-41.html
- https://www.wireshark.org/security/wnpa-sec-2018-41.html
Modified: 2024-11-21
CVE-2018-14370
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1446124eebc3ea5591d18e719c2a5cff3630638
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1446124eebc3ea5591d18e719c2a5cff3630638
- https://www.wireshark.org/security/wnpa-sec-2018-43.html
- https://www.wireshark.org/security/wnpa-sec-2018-43.html