--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2018-d1cfa444d2
2018-06-05 14:09:27.960097
--------------------------------------------------------------------------------
Name : wireshark
Product : Fedora 27
Version : 2.6.1
Release : 1.fc27
URL :
http://www.wireshark.org/
Summary : Network traffic analyzer
Description :
Metapackage with installs wireshark-cli and wireshark-qt.
--------------------------------------------------------------------------------
Update Information:
New version 2.6.1, contains fixes for multiple CVEs. ---- Fixed undefined
reference in tshark, corrected build flags usage
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 24 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.6.1-1
- New version 2.6.1
* Tue May 15 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.6.0-3
- Fixed undefined reference error in tshark (rhbz#1573906)
- Correcting usage of build flags (rhbz#1548665)
* Fri Apr 27 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.6.0-2
- Uploading sources for version 2.6.0
* Fri Apr 27 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.6.0-1
- New version 2.6.0
- Removed GeoIP support, libmaxminddb is used instead
- Removed dftest binary
* Thu Mar 15 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.4.5-3
- Removing dependency on wireshark from wireshark-cli (rhbz#1554818)
- Removing deprecated Group tags
* Tue Mar 13 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.4.5-2
- Added wireshark-qt package to wireshark metapackage (rhbz#1506859)
* Tue Mar 13 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.4.5-1
- New version 2.4.5
- Contains fixes for CVE-2018-7419, CVE-2018-7418, CVE-2018-7417, CVE-2018-7420,
CVE-2018-7320, CVE-2018-7336, CVE-2018-7337, CVE-2018-7334, CVE-2018-7335, CVE-2018-6836,
CVE-2018-5335, CVE-2018-5334, CVE-2017-6014, CVE-2017-9616, CVE-2017-9617, CVE-2017-9766
- Corrected LDFLAGS in spec (rhbz#1548665)
* Fri Jan 19 2018 Michal Ruprich <mruprich(a)redhat.com> - 1:2.4.4-1
- New upstream version 2.4.4
- Contains fix for CVE-2017-17935
* Wed Dec 20 2017 Michal Ruprich <mruprich(a)redhat.com> - 1:2.4.3-1
- New upstream version 2.4.3
- Contains fixes for CVE-2017-17085, CVE-2017-17084, CVE-2017-17083
* Thu Oct 12 2017 Michal Ruprich <mruprich(a)redhat.com> - 1:2.4.2-1
- New upstream version 2.4.2
- Contains fixes for CVE-2017-15189, CVE-2017-15190, CVE-2017-15191, CVE-2017-15192,
CVE-2017-15193, CVE-2017-13764, CVE-2017-13765, CVE-2017-13766, CVE-2017-13767
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1581787 - CVE-2018-11362 wireshark: Out-of-bounds Read in packet-ldss.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581787
[ 2 ] Bug #1581782 - CVE-2018-11361 wireshark: Heap-based Buffer Overflow in
dot11decrypt.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581782
[ 3 ] Bug #1581781 - CVE-2018-11360 wireshark: Heap-based Buffer Overflow in
packet-gsm_a_dtap.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581781
[ 4 ] Bug #1581778 - CVE-2018-11359 wireshark: Out-of-bounds Read in proto.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581778
[ 5 ] Bug #1581773 - CVE-2018-11358 wireshark: Use after free in packet-q931.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581773
[ 6 ] Bug #1581771 - CVE-2018-11357 wireshark: Uncontrolled Resource Consumption in
epan/tvbuff.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581771
[ 7 ] Bug #1581768 - CVE-2018-11356 wireshark: DNS dissector crash in packet-dns.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581768
[ 8 ] Bug #1581758 - CVE-2018-11355 wireshark: Heap-based Buffer Overflow in
packet-rtcp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581758
[ 9 ] Bug #1581752 - CVE-2018-11354 wireshark: Out-of-bounds Read in packet-ieee1905.c
https://bugzilla.redhat.com/show_bug.cgi?id=1581752
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-d1cfa444d2' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------