File _patchinfo of Package patchinfo.12118

<patchinfo incident="12118">
  <issue tracker="bnc" id="1101794">VUL-1: CVE-2018-14368: wireshark: Bazaar protocol dissector could go into an infinite loop</issue>
  <issue tracker="bnc" id="1161052">VUL-1: CVE-2020-7044: wireshark: WASSP dissector could crash</issue>
  <issue tracker="bnc" id="1165241">VUL-0: CVE-2020-9428, CVE-2020-9429, CVE-2020-9430, CVE-2020-9431: wireshark: Update to 3.2.2</issue>
  <issue tracker="bnc" id="1101777">VUL-1: CVE-2018-14342: wireshark: BGP protocol dissector could go into a large loop</issue>
  <issue tracker="bnc" id="1127369">VUL-0: CVE-2019-9209: wireshark:  ASN.1 BER and related dissectors could crash</issue>
  <issue tracker="bnc" id="1101800">VUL-1: CVE-2018-14369: wireshark: HTTP2 dissector could crash</issue>
  <issue tracker="bnc" id="1093733">wireshark fails to build against Qt 5.11</issue>
  <issue tracker="bnc" id="1136021">VUL-0: wireshark: update to versions 3.0.2 and 2.4.15</issue>
  <issue tracker="bnc" id="1101810">VUL-1: CVE-2018-14339: wireshark: MMSE dissector could go into an infinite loop</issue>
  <issue tracker="bnc" id="1101788">VUL-1: CVE-2018-14344: wireshark: ISMP dissector could crash</issue>
  <issue tracker="bnc" id="1131945">VUL-0: wireshark: security update to versions 2.4.14</issue>
  <issue tracker="bnc" id="1101786">VUL-1: CVE-2018-14343: wireshark: ASN.1 BER dissector could crash</issue>
  <issue tracker="bnc" id="1101804">VUL-1: CVE-2018-14340: wireshark: dissectors that support zlib decompression could crash</issue>
  <issue tracker="bnc" id="1121234">VUL-0: CVE-2019-5719: wireshark: ISAKMP dissector could crash (wnpa-sec-2019-04)</issue>
  <issue tracker="bnc" id="1121235">VUL-0: CVE-2019-5721: wireshark: ENIP dissector could crash (wnpa-sec-2019-05)</issue>
  <issue tracker="bnc" id="1150690">VUL-0: CVE-2019-16319: wireshark: Gryphon dissector infinite loop  (wnpa-sec-2019-21)</issue>
  <issue tracker="bnc" id="1158505">VUL-1: CVE-2019-19553: wireshark: CMS dissector crash (wnpa-sec-2019-22)</issue>
  <issue tracker="bnc" id="1121233">VUL-0: CVE-2019-5718: wireshark: RTSE dissector and other ASN.1 dissectors could crash (wnpa-sec-2019-03)</issue>
  <issue tracker="bnc" id="1101802">VUL-1: CVE-2018-14370: wireshark: IEEE 802.11 protocol dissector could crash</issue>
  <issue tracker="bnc" id="957624">AUDIT-0: wireshark: review dumpcap for capabilities based Wireshark privilege separation</issue>
  <issue tracker="bnc" id="1117740">VUL-0: wireshark: multipe dissector crashes and infinite loops fixed in Wireshark 2.6.5 and 2.4.11</issue>
  <issue tracker="bnc" id="1094301">VUL-0: wireshark: multiple vulnerabilities fixed in 2.6.1, 2.4.7, 2.2.15.</issue>
  <issue tracker="bnc" id="1121232">VUL-0: CVE-2019-5717: wireshark: P_MUL dissector could crash (wnpa-sec-2019-02)</issue>
  <issue tracker="bnc" id="1101776">VUL-1: CVE-2018-14341: wireshark: DICOM dissector could go into a large or infinite loop</issue>
  <issue tracker="bnc" id="1121231">VUL-0: CVE-2019-5716: wireshark: 6LoWPAN dissector could crash (wnpa-sec-2019-01)</issue>
  <issue tracker="bnc" id="1111647">VUL-1: CVE-2018-12086: wireshark: wireshark 2.4.10,2.6.4 update</issue>
  <issue tracker="bnc" id="1127370">VUL-0: CVE-2019-9208: wireshark: TCAP dissector could crash</issue>
  <issue tracker="bnc" id="1101791">VUL-1: CVE-2018-14367: wireshark: CoAP protocol dissector could crash</issue>
  <issue tracker="bnc" id="1141980">VUL-0: CVE-2019-13619: wireshark: AN.1 BER dissector crash (wnpa-sec-2019-20)</issue>
  <issue tracker="bnc" id="1127367">VUL-0: CVE-2019-9214: wireshark: RPCAP dissector could crash</issue>
  <issue tracker="bnc" id="1131941">VUL-0: wireshark: security update to version 3.0.1</issue>
  <issue tracker="bnc" id="1106514">VUL-0: wireshark: 2.6.3, 2.4.9, 2.2.17 releases</issue>
  <issue tracker="bnc" id="1156288">wireshark: GeoIP support is discontinued </issue>
  <issue tracker="bnc" id="1165710">[TRACKERBUG] ECO-1203 update Wireshark to 3.2</issue>
  <issue tracker="cve" id="2018-19626"/>
  <issue tracker="cve" id="2019-10898"/>
  <issue tracker="cve" id="2018-14340"/>
  <issue tracker="cve" id="2018-11359"/>
  <issue tracker="cve" id="2019-5721"/>
  <issue tracker="cve" id="2018-14344"/>
  <issue tracker="cve" id="2018-14341"/>
  <issue tracker="cve" id="2018-11358"/>
  <issue tracker="cve" id="2018-19627"/>
  <issue tracker="cve" id="2020-7044"/>
  <issue tracker="cve" id="2018-18225"/>
  <issue tracker="cve" id="2019-9208"/>
  <issue tracker="cve" id="2019-5719"/>
  <issue tracker="cve" id="2018-11360"/>
  <issue tracker="cve" id="2018-11355"/>
  <issue tracker="cve" id="2018-14342"/>
  <issue tracker="cve" id="2019-10902"/>
  <issue tracker="cve" id="2018-14339"/>
  <issue tracker="cve" id="2019-5718"/>
  <issue tracker="cve" id="2018-19625"/>
  <issue tracker="cve" id="2018-14368"/>
  <issue tracker="cve" id="2019-10901"/>
  <issue tracker="cve" id="2018-16056"/>
  <issue tracker="cve" id="2020-9431"/>
  <issue tracker="cve" id="2018-11357"/>
  <issue tracker="cve" id="2019-10896"/>
  <issue tracker="cve" id="2019-19553"/>
  <issue tracker="cve" id="2018-11354"/>
  <issue tracker="cve" id="2018-19623"/>
  <issue tracker="cve" id="2019-10899"/>
  <issue tracker="cve" id="2019-9214"/>
  <issue tracker="cve" id="2018-14343"/>
  <issue tracker="cve" id="2018-19622"/>
  <issue tracker="cve" id="2020-9428"/>
  <issue tracker="cve" id="2020-9429"/>
  <issue tracker="cve" id="2018-18226"/>
  <issue tracker="cve" id="2019-13619"/>
  <issue tracker="cve" id="2018-11362"/>
  <issue tracker="cve" id="2019-10897"/>
  <issue tracker="cve" id="2019-5716"/>
  <issue tracker="cve" id="2018-19624"/>
  <issue tracker="cve" id="2018-12086"/>
  <issue tracker="cve" id="2018-16058"/>
  <issue tracker="cve" id="2018-16057"/>
  <issue tracker="cve" id="2018-14367"/>
  <issue tracker="cve" id="2019-16319"/>
  <issue tracker="cve" id="2018-11356"/>
  <issue tracker="cve" id="2018-11361"/>
  <issue tracker="cve" id="2018-19628"/>
  <issue tracker="cve" id="2019-5717"/>
  <issue tracker="cve" id="2019-10900"/>
  <issue tracker="cve" id="2018-14370"/>
  <issue tracker="cve" id="2019-10894"/>
  <issue tracker="cve" id="2019-10903"/>
  <issue tracker="cve" id="2019-10895"/>
  <issue tracker="cve" id="2018-18227"/>
  <issue tracker="cve" id="2018-14369"/>
  <issue tracker="cve" id="2019-9209"/>
  <issue tracker="cve" id="2020-9430"/>

  <packager>rfrohl</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for wireshark</summary>
  <description>This update for wireshark and libmaxminddb fixes the following issues:

Update wireshark to new major version 3.2.2 and introduce libmaxminddb for GeoIP support (bsc#1156288).

New features include:

- Added support for 111 new protocols, including WireGuard, LoRaWAN, TPM 2.0, 802.11ax and QUIC
- Improved support for existing protocols, like HTTP/2
- Improved analytics and usability functionalities

This update was imported from the SUSE:SLE-15:Update update project.</description>
</patchinfo>