openSUSE Security Update: wireshark: update to 1.4.15 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:1035-1 Rating: moderate References: #776083 Cross-References: CVE-2012-4285 CVE-2012-4288 CVE-2012-4289 CVE-2012-4290 CVE-2012-4291 CVE-2012-4292 CVE-2012-4293 CVE-2012-4296 Affected Products: openSUSE 12.1 openSUSE 11.4 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: wireshark was updated to 1.4.15 * The DCP ETSI dissector could trigger a zero division. (wnpa-sec-2012-13 CVE-2012-4285) * The XTP dissector could go into an infinite loop. (wnpa-sec-2012-15 CVE-2012-4288) * The AFP dissector could go into a large loop. (wnpa-sec-2012-17 CVE-2012-4289) * The RTPS2 dissector could overflow a buffer. (wnpa-sec-2012-18 CVE-2012-4296) * The CIP dissector could exhaust system memory. (wnpa-sec-2012-20 CVE-2012-4291) * The STUN dissector could crash. (wnpa-sec-2012-21 CVE-2012-4292) * The EtherCAT Mailbox dissector could abort. (wnpa-sec-2012-22 CVE-2012-4293) * The CTDB dissector could go into a large loop. (wnpa-sec-2012-23 CVE-2012-4290) Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.4.15.html Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.1: zypper in -t patch openSUSE-2012-526 - openSUSE 11.4: zypper in -t patch openSUSE-2012-526 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.1 (i586 x86_64): wireshark-1.4.15-3.20.1 wireshark-debuginfo-1.4.15-3.20.1 wireshark-debugsource-1.4.15-3.20.1 wireshark-devel-1.4.15-3.20.1 - openSUSE 11.4 (i586 x86_64): wireshark-1.4.15-0.22.1 wireshark-debuginfo-1.4.15-0.22.1 wireshark-debugsource-1.4.15-0.22.1 wireshark-devel-1.4.15-0.22.1 References: http://support.novell.com/security/cve/CVE-2012-4285.html http://support.novell.com/security/cve/CVE-2012-4288.html http://support.novell.com/security/cve/CVE-2012-4289.html http://support.novell.com/security/cve/CVE-2012-4290.html http://support.novell.com/security/cve/CVE-2012-4291.html http://support.novell.com/security/cve/CVE-2012-4292.html http://support.novell.com/security/cve/CVE-2012-4293.html http://support.novell.com/security/cve/CVE-2012-4296.html https://bugzilla.novell.com/776083