File _patchinfo of Package patchinfo.10537
<patchinfo incident="10537">
<issue tracker="bnc" id="1127367">VUL-0: CVE-2019-9214: wireshark: RPCAP dissector could crash</issue>
<issue tracker="bnc" id="1127370">VUL-0: CVE-2019-9208: wireshark: TCAP dissector could crash</issue>
<issue tracker="bnc" id="1127369">VUL-0: CVE-2019-9209: wireshark: ASN.1 BER and related dissectors could crash</issue>
<issue tracker="cve" id="2019-9209"/>
<issue tracker="cve" id="2019-9208"/>
<issue tracker="cve" id="2019-9214"/>
<category>security</category>
<rating>moderate</rating>
<packager>rfrohl</packager>
<description>This update for wireshark to version 2.4.13 fixes the following issues:
Security issues fixed:
- CVE-2019-9214: Avoided a dereference of a null coversation which could make RPCAP
dissector crash (bsc#1127367).
- CVE-2019-9209: Fixed a buffer overflow in time values which could make ASN.1 BER
and related dissectors crash (bsc#1127369).
- CVE-2019-9208: Fixed a null pointer dereference which could make TCAP dissector
crash (bsc#1127370).
Release notes: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html
</description>
<summary>Security update for wireshark</summary>
</patchinfo>