Bug 13343

Summary: [CVE 21] wireshark 4.0.1 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: critical    
Priority: High CC: a.proklov, e.malashin, pastordidi, s.matveev, y.tumanov
Version: AllFlags: pastordidi: qa_verified+
y.tumanov: secteam_verified+
a.proklov: published+
Target Milestone: 2021.1 Fresh R12   
Hardware: All   
OS: Linux   
URL: CVE-2022-4344, CVE-2022-4345, CVE-2023-0411, CVE-2023-0412, CVE-2023-0413, CVE-2023-0414, CVE-2023-0415, CVE-2023-0416, CVE-2023-0417, CVE-2023-1161, CVE-2023-1992, CVE-2023-1993, CVE-2023-1994,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-05-03 18:21:57 MSK
Please patch CVEs for package wireshark version 4.0.1
  
INFO (CVEs are): wireshark 4.0.1
 cves found
CVE-2022-4344
Desc: Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-4344
Severity: MEDIUM
CVE-2022-4345
Desc: Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-4345
Severity: MEDIUM
CVE-2023-0411
Desc: Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0411
Severity: MEDIUM
CVE-2023-0412
Desc: TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0412
Severity: HIGH
CVE-2023-0413
Desc: Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0413
Severity: MEDIUM
CVE-2023-0414
Desc: Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0414
Severity: MEDIUM
CVE-2023-0415
Desc: iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0415
Severity: MEDIUM
CVE-2023-0416
Desc: GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0416
Severity: MEDIUM
CVE-2023-0417
Desc: Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0417
Severity: MEDIUM
CVE-2023-1161
Desc: ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-1161
Severity: HIGH
CVE-2023-1992
Desc: RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-1992
Severity: HIGH
CVE-2023-1993
Desc: LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-1993
Severity: MEDIUM
CVE-2023-1994
Desc: GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-1994
Severity: MEDIUM
Comment 1 Svyatoslav Matveev 2023-05-11 14:41:37 MSK
********** QA ADVISORY **********

CVE закрыты обновлением проекта.

*** wireshark
**  upd: 4.0.1 -> 4.0.5

https://abf.io/build_lists/4439040
https://abf.io/build_lists/4439041
https://abf.io/build_lists/4439039
https://abf.io/build_lists/4439043
https://abf.io/build_lists/4439042
Comment 2 e.malashin@rosalinux.ru 2023-05-12 16:18:07 MSK
(In reply to Svyatoslav Matveev from comment #1)
> ********** QA ADVISORY **********
> 
> CVE закрыты обновлением проекта.
> 
> *** wireshark
> **  upd: 4.0.1 -> 4.0.5
> 
> https://abf.io/build_lists/4439040
> https://abf.io/build_lists/4439041
> https://abf.io/build_lists/4439039
> https://abf.io/build_lists/4439043
> https://abf.io/build_lists/4439042


The update sent to testings
Comment 3 Dmitry Postnikov 2023-05-14 10:03:31 MSK
********** QA ADVISORY **********

CVE закрыты обновлением проекта.

*** wireshark
**  upd: 4.0.1 -> 4.0.5

Fix:

CVE-2022-4344, CVE-2022-4345, CVE-2023-0411, CVE-2023-0412, CVE-2023-0413, CVE-2023-0414, CVE-2023-0415, CVE-2023-0416, CVE-2023-0417, CVE-2023-1161, CVE-2023-1992, CVE-2023-1993, CVE-2023-1994
*********************************

QA Verified
Comment 4 Yury 2023-07-25 12:52:41 MSK
Secteam Verified