openSUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:0362-1 Rating: moderate References: #1093733 #1094301 #1101776 #1101777 #1101786 #1101788 #1101791 #1101794 #1101800 #1101802 #1101804 #1101810 #1106514 #1111647 #1117740 #1121231 #1121232 #1121233 #1121234 #1121235 #1127367 #1127369 #1127370 #1131941 #1131945 #1136021 #1141980 #1150690 #1156288 #1158505 #1161052 #1165241 #1165710 #957624 Cross-References: CVE-2018-11354 CVE-2018-11355 CVE-2018-11356 CVE-2018-11357 CVE-2018-11358 CVE-2018-11359 CVE-2018-11360 CVE-2018-11361 CVE-2018-11362 CVE-2018-12086 CVE-2018-14339 CVE-2018-14340 CVE-2018-14341 CVE-2018-14342 CVE-2018-14343 CVE-2018-14344 CVE-2018-14367 CVE-2018-14368 CVE-2018-14369 CVE-2018-14370 CVE-2018-16056 CVE-2018-16057 CVE-2018-16058 CVE-2018-18225 CVE-2018-18226 CVE-2018-18227 CVE-2018-19622 CVE-2018-19623 CVE-2018-19624 CVE-2018-19625 CVE-2018-19626 CVE-2018-19627 CVE-2018-19628 CVE-2019-10894 CVE-2019-10895 CVE-2019-10896 CVE-2019-10897 CVE-2019-10898 CVE-2019-10899 CVE-2019-10900 CVE-2019-10901 CVE-2019-10902 CVE-2019-10903 CVE-2019-13619 CVE-2019-16319 CVE-2019-19553 CVE-2019-5716 CVE-2019-5717 CVE-2019-5718 CVE-2019-5719 CVE-2019-5721 CVE-2019-9208 CVE-2019-9209 CVE-2019-9214 CVE-2020-7044 CVE-2020-9428 CVE-2020-9429 CVE-2020-9430 CVE-2020-9431 Affected Products: openSUSE Leap 15.1 ______________________________________________________________________________ An update that fixes 59 vulnerabilities is now available. Description: This update for wireshark and libmaxminddb fixes the following issues: Update wireshark to new major version 3.2.2 and introduce libmaxminddb for GeoIP support (bsc#1156288). New features include: - Added support for 111 new protocols, including WireGuard, LoRaWAN, TPM 2.0, 802.11ax and QUIC - Improved support for existing protocols, like HTTP/2 - Improved analytics and usability functionalities This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2020-362=1 Package List: - openSUSE Leap 15.1 (i586 x86_64): libmaxminddb-debugsource-1.4.2-lp151.3.3.1 libmaxminddb-devel-1.4.2-lp151.3.3.1 libmaxminddb0-1.4.2-lp151.3.3.1 libmaxminddb0-debuginfo-1.4.2-lp151.3.3.1 libspandsp2-0.0.6-lp151.3.3.1 libspandsp2-debuginfo-0.0.6-lp151.3.3.1 libwireshark13-3.2.2-lp151.2.9.1 libwireshark13-debuginfo-3.2.2-lp151.2.9.1 libwiretap10-3.2.2-lp151.2.9.1 libwiretap10-debuginfo-3.2.2-lp151.2.9.1 libwsutil11-3.2.2-lp151.2.9.1 libwsutil11-debuginfo-3.2.2-lp151.2.9.1 mmdblookup-1.4.2-lp151.3.3.1 mmdblookup-debuginfo-1.4.2-lp151.3.3.1 spandsp-debugsource-0.0.6-lp151.3.3.1 spandsp-devel-0.0.6-lp151.3.3.1 wireshark-3.2.2-lp151.2.9.1 wireshark-debuginfo-3.2.2-lp151.2.9.1 wireshark-debugsource-3.2.2-lp151.2.9.1 wireshark-devel-3.2.2-lp151.2.9.1 wireshark-ui-qt-3.2.2-lp151.2.9.1 wireshark-ui-qt-debuginfo-3.2.2-lp151.2.9.1 - openSUSE Leap 15.1 (noarch): spandsp-doc-0.0.6-lp151.3.3.1 - openSUSE Leap 15.1 (x86_64): libmaxminddb0-32bit-1.4.2-lp151.3.3.1 libmaxminddb0-32bit-debuginfo-1.4.2-lp151.3.3.1 libspandsp2-32bit-0.0.6-lp151.3.3.1 libspandsp2-32bit-debuginfo-0.0.6-lp151.3.3.1 References: https://www.suse.com/security/cve/CVE-2018-11354.html https://www.suse.com/security/cve/CVE-2018-11355.html https://www.suse.com/security/cve/CVE-2018-11356.html https://www.suse.com/security/cve/CVE-2018-11357.html https://www.suse.com/security/cve/CVE-2018-11358.html https://www.suse.com/security/cve/CVE-2018-11359.html https://www.suse.com/security/cve/CVE-2018-11360.html https://www.suse.com/security/cve/CVE-2018-11361.html https://www.suse.com/security/cve/CVE-2018-11362.html https://www.suse.com/security/cve/CVE-2018-12086.html https://www.suse.com/security/cve/CVE-2018-14339.html https://www.suse.com/security/cve/CVE-2018-14340.html https://www.suse.com/security/cve/CVE-2018-14341.html https://www.suse.com/security/cve/CVE-2018-14342.html https://www.suse.com/security/cve/CVE-2018-14343.html https://www.suse.com/security/cve/CVE-2018-14344.html https://www.suse.com/security/cve/CVE-2018-14367.html https://www.suse.com/security/cve/CVE-2018-14368.html https://www.suse.com/security/cve/CVE-2018-14369.html https://www.suse.com/security/cve/CVE-2018-14370.html https://www.suse.com/security/cve/CVE-2018-16056.html https://www.suse.com/security/cve/CVE-2018-16057.html https://www.suse.com/security/cve/CVE-2018-16058.html https://www.suse.com/security/cve/CVE-2018-18225.html https://www.suse.com/security/cve/CVE-2018-18226.html https://www.suse.com/security/cve/CVE-2018-18227.html https://www.suse.com/security/cve/CVE-2018-19622.html https://www.suse.com/security/cve/CVE-2018-19623.html https://www.suse.com/security/cve/CVE-2018-19624.html https://www.suse.com/security/cve/CVE-2018-19625.html https://www.suse.com/security/cve/CVE-2018-19626.html https://www.suse.com/security/cve/CVE-2018-19627.html https://www.suse.com/security/cve/CVE-2018-19628.html https://www.suse.com/security/cve/CVE-2019-10894.html https://www.suse.com/security/cve/CVE-2019-10895.html https://www.suse.com/security/cve/CVE-2019-10896.html https://www.suse.com/security/cve/CVE-2019-10897.html https://www.suse.com/security/cve/CVE-2019-10898.html https://www.suse.com/security/cve/CVE-2019-10899.html https://www.suse.com/security/cve/CVE-2019-10900.html https://www.suse.com/security/cve/CVE-2019-10901.html https://www.suse.com/security/cve/CVE-2019-10902.html https://www.suse.com/security/cve/CVE-2019-10903.html https://www.suse.com/security/cve/CVE-2019-13619.html https://www.suse.com/security/cve/CVE-2019-16319.html https://www.suse.com/security/cve/CVE-2019-19553.html https://www.suse.com/security/cve/CVE-2019-5716.html https://www.suse.com/security/cve/CVE-2019-5717.html https://www.suse.com/security/cve/CVE-2019-5718.html https://www.suse.com/security/cve/CVE-2019-5719.html https://www.suse.com/security/cve/CVE-2019-5721.html https://www.suse.com/security/cve/CVE-2019-9208.html https://www.suse.com/security/cve/CVE-2019-9209.html https://www.suse.com/security/cve/CVE-2019-9214.html https://www.suse.com/security/cve/CVE-2020-7044.html https://www.suse.com/security/cve/CVE-2020-9428.html https://www.suse.com/security/cve/CVE-2020-9429.html https://www.suse.com/security/cve/CVE-2020-9430.html https://www.suse.com/security/cve/CVE-2020-9431.html https://bugzilla.suse.com/1093733 https://bugzilla.suse.com/1094301 https://bugzilla.suse.com/1101776 https://bugzilla.suse.com/1101777 https://bugzilla.suse.com/1101786 https://bugzilla.suse.com/1101788 https://bugzilla.suse.com/1101791 https://bugzilla.suse.com/1101794 https://bugzilla.suse.com/1101800 https://bugzilla.suse.com/1101802 https://bugzilla.suse.com/1101804 https://bugzilla.suse.com/1101810 https://bugzilla.suse.com/1106514 https://bugzilla.suse.com/1111647 https://bugzilla.suse.com/1117740 https://bugzilla.suse.com/1121231 https://bugzilla.suse.com/1121232 https://bugzilla.suse.com/1121233 https://bugzilla.suse.com/1121234 https://bugzilla.suse.com/1121235 https://bugzilla.suse.com/1127367 https://bugzilla.suse.com/1127369 https://bugzilla.suse.com/1127370 https://bugzilla.suse.com/1131941 https://bugzilla.suse.com/1131945 https://bugzilla.suse.com/1136021 https://bugzilla.suse.com/1141980 https://bugzilla.suse.com/1150690 https://bugzilla.suse.com/1156288 https://bugzilla.suse.com/1158505 https://bugzilla.suse.com/1161052 https://bugzilla.suse.com/1165241 https://bugzilla.suse.com/1165710 https://bugzilla.suse.com/957624 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org