<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0305</id>
    <title>An update for wireshark is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2024-11-19 07:40:47"/>
    <updated date="2024-11-19 07:40:47"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-24476" id="CVE-2024-24476" title="CVE-2024-24476 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-8250" id="CVE-2024-8250" title="CVE-2024-8250 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-8645" id="CVE-2024-8645" title="CVE-2024-8645 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected. (CVE-2024-24476)

NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file (CVE-2024-8250)

SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file (CVE-2024-8645)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="wireshark">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="wireshark" version="3.6.14" release="8.r3.hce2">
          <filename>wireshark-3.6.14-8.r3.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="wireshark-devel" version="3.6.14" release="8.r3.hce2">
          <filename>wireshark-devel-3.6.14-8.r3.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="wireshark-help" version="3.6.14" release="8.r3.hce2">
          <filename>wireshark-help-3.6.14-8.r3.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="wireshark" version="3.6.14" release="8.r3.hce2">
          <filename>wireshark-3.6.14-8.r3.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="wireshark-devel" version="3.6.14" release="8.r3.hce2">
          <filename>wireshark-devel-3.6.14-8.r3.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="wireshark-help" version="3.6.14" release="8.r3.hce2">
          <filename>wireshark-help-3.6.14-8.r3.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
