SUSE-SU-2017:1664-1: moderate: Security update for wireshark
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Jun 23 10:13:12 MDT 2017
SUSE Security Update: Security update for wireshark
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:1664-1
Rating: moderate
References: #1042298 #1042299 #1042300 #1042301 #1042302
#1042303 #1042304 #1042305 #1042306 #1042307
#1042308 #1042309
Cross-References: CVE-2017-9343 CVE-2017-9344 CVE-2017-9345
CVE-2017-9346 CVE-2017-9347 CVE-2017-9348
CVE-2017-9349 CVE-2017-9350 CVE-2017-9351
CVE-2017-9352 CVE-2017-9353 CVE-2017-9354
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes 12 vulnerabilities is now available.
Description:
The network analysis tool wireshark was updated to version 2.0.13 to fix
the following issues:
* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22)
(bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23)
(bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24)
(bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25)
(bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26)
(bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27)
(bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28)
(bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29)
(bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33)
(bsc#1042306)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-wireshark-13170=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-wireshark-13170=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-wireshark-13170=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
wireshark-devel-2.0.13-39.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
wireshark-2.0.13-39.1
wireshark-gtk-2.0.13-39.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
wireshark-2.0.13-39.1
wireshark-gtk-2.0.13-39.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
wireshark-debuginfo-2.0.13-39.1
wireshark-debugsource-2.0.13-39.1
References:
https://www.suse.com/security/cve/CVE-2017-9343.html
https://www.suse.com/security/cve/CVE-2017-9344.html
https://www.suse.com/security/cve/CVE-2017-9345.html
https://www.suse.com/security/cve/CVE-2017-9346.html
https://www.suse.com/security/cve/CVE-2017-9347.html
https://www.suse.com/security/cve/CVE-2017-9348.html
https://www.suse.com/security/cve/CVE-2017-9349.html
https://www.suse.com/security/cve/CVE-2017-9350.html
https://www.suse.com/security/cve/CVE-2017-9351.html
https://www.suse.com/security/cve/CVE-2017-9352.html
https://www.suse.com/security/cve/CVE-2017-9353.html
https://www.suse.com/security/cve/CVE-2017-9354.html
https://bugzilla.suse.com/1042298
https://bugzilla.suse.com/1042299
https://bugzilla.suse.com/1042300
https://bugzilla.suse.com/1042301
https://bugzilla.suse.com/1042302
https://bugzilla.suse.com/1042303
https://bugzilla.suse.com/1042304
https://bugzilla.suse.com/1042305
https://bugzilla.suse.com/1042306
https://bugzilla.suse.com/1042307
https://bugzilla.suse.com/1042308
https://bugzilla.suse.com/1042309
More information about the sle-security-updates
mailing list