Bugzilla – Bug 998800
VUL-1: CVE-2016-7180: wireshark: IPMI Trace dissector crash
Last modified: 2018-10-13 16:01:40 UTC
rh#1375119 It was reported that Wireshark's IPMI Trace dissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Upstream bug(s): https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12782 External References: https://www.wireshark.org/security/wnpa-sec-2016-55.html References: https://bugzilla.redhat.com/show_bug.cgi?id=1375119 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7180 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7180.html http://www.cvedetails.com/cve/CVE-2016-7180/
bugbot adjusting priority
Since we need to update to 2.x version, there is a new fate created for this bug, see https://fate.suse.com/321770
a new version wireshark 2.2.2 can build for SLE12, but whether update to 2.2.2 depends on fate#321770, see https://fate.suse.com/321770
resolved by the latest update
SUSE-SU-2017:1174-1: An update that solves 23 vulnerabilities and has two fixes is now available. Category: security (moderate) Bug References: 1002981,1010735,1010740,1010752,1010754,1010911,1021739,1025913,1027998,1033936,1033937,1033938,1033939,1033940,1033941,1033942,1033943,1033944,1033945,998761,998762,998763,998800,998963,998964 CVE References: CVE-2016-7175,CVE-2016-7176,CVE-2016-7177,CVE-2016-7178,CVE-2016-7179,CVE-2016-7180,CVE-2016-9373,CVE-2016-9374,CVE-2016-9375,CVE-2016-9376,CVE-2017-5596,CVE-2017-5597,CVE-2017-6014,CVE-2017-7700,CVE-2017-7701,CVE-2017-7702,CVE-2017-7703,CVE-2017-7704,CVE-2017-7705,CVE-2017-7745,CVE-2017-7746,CVE-2017-7747,CVE-2017-7748 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): wireshark-2.0.12-36.1 SUSE Linux Enterprise Server 11-SP4 (src): wireshark-2.0.12-36.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): wireshark-2.0.12-36.1
SUSE-SU-2017:1442-1: An update that solves 24 vulnerabilities and has four fixes is now available. Category: security (moderate) Bug References: 1002981,1010735,1010740,1010752,1010754,1010911,1021739,1025913,1026507,1027692,1027998,1033936,1033937,1033938,1033939,1033940,1033941,1033942,1033943,1033944,1033945,990856,998761,998762,998763,998800,998963,998964 CVE References: CVE-2016-6354,CVE-2016-7175,CVE-2016-7176,CVE-2016-7177,CVE-2016-7178,CVE-2016-7179,CVE-2016-7180,CVE-2016-9373,CVE-2016-9374,CVE-2016-9375,CVE-2016-9376,CVE-2017-5596,CVE-2017-5597,CVE-2017-6014,CVE-2017-7700,CVE-2017-7701,CVE-2017-7702,CVE-2017-7703,CVE-2017-7704,CVE-2017-7705,CVE-2017-7745,CVE-2017-7746,CVE-2017-7747,CVE-2017-7748 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): wireshark-2.2.6-44.3 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): wireshark-2.2.6-44.3 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): wireshark-2.2.6-44.3 SUSE Linux Enterprise Server 12-SP2 (src): wireshark-2.2.6-44.3 SUSE Linux Enterprise Server 12-SP1 (src): wireshark-2.2.6-44.3 SUSE Linux Enterprise Desktop 12-SP2 (src): wireshark-2.2.6-44.3 SUSE Linux Enterprise Desktop 12-SP1 (src): wireshark-2.2.6-44.3
This is an autogenerated message for OBS integration: This bug (998800) was mentioned in https://build.opensuse.org/request/show/641836 42.3 / wireshark