File _patchinfo of Package patchinfo.35061
<patchinfo incident="35061"> <issue tracker="bnc" id="1222030">VUL-0: CVE-2024-2955: wireshark: T.38 dissector crash</issue> <issue tracker="bnc" id="1218503">VUL-0: CVE-2024-0207: wireshark: HTTP3 dissector crash</issue> <issue tracker="bnc" id="1218506">VUL-0: CVE-2024-0210: wireshark: Zigbee TLV dissector crash</issue> <issue tracker="bnc" id="1218507">VUL-0: CVE-2024-0211: wireshark: DOCSIS dissector crash</issue> <issue tracker="bnc" id="1217247">VUL-0: CVE-2023-6174: wireshark: SSH dissector crash via packet injection or crafted capture file</issue> <issue tracker="bnc" id="1217272">VUL-0: CVE-2023-6175: wireshark: NetScreen file parser crash</issue> <issue tracker="bnc" id="1215959">VUL-0: CVE-2023-5371: wireshark: RTPS dissector memory leak (wnpa-sec-2023-27)</issue> <issue tracker="bnc" id="1213318">VUL-0: CVE-2023-3649: wireshark: iSCSI dissector crash</issue> <issue tracker="bnc" id="1211708">VUL-0: CVE-2023-2854: wireshark: BLF file parser crash</issue> <issue tracker="bnc" id="1211709">VUL-0: CVE-2023-0666: wireshark: RTPS dissector crash</issue> <issue tracker="bnc" id="1207666">VUL-0: CVE-2023-0414: wireshark: crash in the EAP dissector</issue> <issue tracker="cve" id="2024-2955"/> <issue tracker="cve" id="2024-0207"/> <issue tracker="cve" id="2024-0210"/> <issue tracker="cve" id="2024-0211"/> <issue tracker="cve" id="2023-6174"/> <issue tracker="cve" id="2023-6175"/> <issue tracker="cve" id="2023-5371"/> <issue tracker="cve" id="2023-3649"/> <issue tracker="cve" id="2023-2854"/> <issue tracker="cve" id="2023-0666"/> <issue tracker="cve" id="2023-0414"/> <issue tracker="jsc" id="PED-8517"/> <packager>rfrohl</packager> <rating>important</rating> <category>security</category> <summary>Security update for wireshark</summary> <description>This update for wireshark fixes the following issues: wireshark was updated from version 3.6.23 to version 4.2.6 (jsc#PED-8517): - Security issues fixed with this update: * CVE-2024-0207: HTTP3 dissector crash (bsc#1218503) * CVE-2024-0210: Zigbee TLV dissector crash (bsc#1218506) * CVE-2024-0211: DOCSIS dissector crash (bsc#1218507) * CVE-2023-6174: Fixed SSH dissector crash (bsc#1217247) * CVE-2023-6175: NetScreen file parser crash (bsc#1217272) * CVE-2023-5371: RTPS dissector memory leak (bsc#1215959) * CVE-2023-3649: iSCSI dissector crash (bsc#1213318) * CVE-2023-2854: BLF file parser crash (bsc#1211708) * CVE-2023-0666: RTPS dissector crash (bsc#1211709) * CVE-2023-0414: EAP dissector crash (bsc#1207666) - Major changes introduced with versions 4.2.0 and 4.0.0: * Version 4.2.0 https://www.wireshark.org/docs/relnotes/wireshark-4.2.0.html * Version 4.0.0 https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html - Added an aditional desktopfile to start wireshark which asks for the super user password. </description> </patchinfo>