<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0175</id>
    <title>An update for wireshark is now available for HCE 3.0</title>
    <severity>Important</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:21"/>
    <updated date="2025-10-09 06:38:21"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-8645" id="CVE-2024-8645" title="CVE-2024-8645 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-4854" id="CVE-2024-4854" title="CVE-2024-4854 Base Score: 6.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-8250" id="CVE-2024-8250" title="CVE-2024-8250 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-4853" id="CVE-2024-4853" title="CVE-2024-4853 Base Score: 3.6 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-4855" id="CVE-2024-4855" title="CVE-2024-4855 Base Score: 3.6 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-24476" id="CVE-2024-24476" title="CVE-2024-24476 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file (CVE-2024-8645)

MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file (CVE-2024-4854)

NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file (CVE-2024-8250)

Memory handling issue in editcap could cause denial of service via crafted capture file (CVE-2024-4853)

Use after free issue in editcap could cause denial of service via crafted capture file (CVE-2024-4855)

A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected. (CVE-2024-24476)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="wireshark">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="wireshark" version="3.6.14" release="12.hce3">
          <filename>wireshark-3.6.14-12.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="wireshark-devel" version="3.6.14" release="12.hce3">
          <filename>wireshark-devel-3.6.14-12.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="wireshark-help" version="3.6.14" release="12.hce3">
          <filename>wireshark-help-3.6.14-12.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="wireshark" version="3.6.14" release="12.hce3">
          <filename>wireshark-3.6.14-12.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="wireshark-devel" version="3.6.14" release="12.hce3">
          <filename>wireshark-devel-3.6.14-12.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="wireshark-help" version="3.6.14" release="12.hce3">
          <filename>wireshark-help-3.6.14-12.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
