SUSE-SU-2015:1676-1: moderate: Security update for wireshark
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Oct 5 07:09:45 MDT 2015
SUSE Security Update: Security update for wireshark
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1676-1
Rating: moderate
References: #935158 #941500
Cross-References: CVE-2015-3813 CVE-2015-4652 CVE-2015-6241
CVE-2015-6242 CVE-2015-6243 CVE-2015-6244
CVE-2015-6245 CVE-2015-6246 CVE-2015-6247
CVE-2015-6248 CVE-2015-6249
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Software Development Kit 11-SP3
SUSE Linux Enterprise Server for VMWare 11-SP3
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3
______________________________________________________________________________
An update that fixes 11 vulnerabilities is now available.
Description:
Wireshark has been updated to 1.12.7. (FATE#319388)
The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree.
wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22
CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector.
wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop.
wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27
CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking.
wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html
Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158
CVE-2015-4652)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-wireshark-1127-12112=1
- SUSE Linux Enterprise Software Development Kit 11-SP3:
zypper in -t patch sdksp3-wireshark-1127-12112=1
- SUSE Linux Enterprise Server for VMWare 11-SP3:
zypper in -t patch slessp3-wireshark-1127-12112=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-wireshark-1127-12112=1
- SUSE Linux Enterprise Server 11-SP3:
zypper in -t patch slessp3-wireshark-1127-12112=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
wireshark-devel-1.12.7-0.5.3
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
wireshark-1.12.7-0.5.3
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 ia64 ppc64 s390x x86_64):
wireshark-devel-1.12.7-0.5.3
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 x86_64):
wireshark-1.12.7-0.5.3
- SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64):
wireshark-1.12.7-0.5.3
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
wireshark-1.12.7-0.5.3
- SUSE Linux Enterprise Server 11-SP3 (i586 ia64 ppc64 s390x x86_64):
wireshark-1.12.7-0.5.3
References:
https://www.suse.com/security/cve/CVE-2015-3813.html
https://www.suse.com/security/cve/CVE-2015-4652.html
https://www.suse.com/security/cve/CVE-2015-6241.html
https://www.suse.com/security/cve/CVE-2015-6242.html
https://www.suse.com/security/cve/CVE-2015-6243.html
https://www.suse.com/security/cve/CVE-2015-6244.html
https://www.suse.com/security/cve/CVE-2015-6245.html
https://www.suse.com/security/cve/CVE-2015-6246.html
https://www.suse.com/security/cve/CVE-2015-6247.html
https://www.suse.com/security/cve/CVE-2015-6248.html
https://www.suse.com/security/cve/CVE-2015-6249.html
https://bugzilla.suse.com/935158
https://bugzilla.suse.com/941500
More information about the sle-security-updates
mailing list