openSUSE-SU-2015:1836-1: moderate: Security update for wireshark
openSUSE Security Update: Security update for wireshark ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:1836-1 Rating: moderate References: #941500 #950437 Cross-References: CVE-2015-6241 CVE-2015-6242 CVE-2015-6243 CVE-2015-6244 CVE-2015-6245 CVE-2015-6246 CVE-2015-6247 CVE-2015-6248 CVE-2015-6249 CVE-2015-7830 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: wireshark was updated to version 1.12.8 to fix ten security issues. These security issues were fixed: - CVE-2015-6247: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 did not validate a certain offset value, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500). - CVE-2015-6246: The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6245: epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 used incorrect integer data types, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500). - CVE-2015-6244: The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6243: The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions (bsc#941500). - CVE-2015-6242: The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 did not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allowed remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet (bsc#941500). - CVE-2015-6241: The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 did not properly terminate a data structure after a failure to locate a number within a string, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437). - CVE-2015-6249: The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 did not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6248: The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 did not check whether the expected amount of data is available, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-683=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-683=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): wireshark-1.12.8-25.1 wireshark-debuginfo-1.12.8-25.1 wireshark-debugsource-1.12.8-25.1 wireshark-devel-1.12.8-25.1 wireshark-ui-gtk-1.12.8-25.1 wireshark-ui-gtk-debuginfo-1.12.8-25.1 wireshark-ui-qt-1.12.8-25.1 wireshark-ui-qt-debuginfo-1.12.8-25.1 - openSUSE 13.1 (i586 x86_64): wireshark-1.12.8-43.1 wireshark-debuginfo-1.12.8-43.1 wireshark-debugsource-1.12.8-43.1 wireshark-devel-1.12.8-43.1 wireshark-ui-gtk-1.12.8-43.1 wireshark-ui-gtk-debuginfo-1.12.8-43.1 wireshark-ui-qt-1.12.8-43.1 wireshark-ui-qt-debuginfo-1.12.8-43.1 References: https://www.suse.com/security/cve/CVE-2015-6241.html https://www.suse.com/security/cve/CVE-2015-6242.html https://www.suse.com/security/cve/CVE-2015-6243.html https://www.suse.com/security/cve/CVE-2015-6244.html https://www.suse.com/security/cve/CVE-2015-6245.html https://www.suse.com/security/cve/CVE-2015-6246.html https://www.suse.com/security/cve/CVE-2015-6247.html https://www.suse.com/security/cve/CVE-2015-6248.html https://www.suse.com/security/cve/CVE-2015-6249.html https://www.suse.com/security/cve/CVE-2015-7830.html https://bugzilla.suse.com/941500 https://bugzilla.suse.com/950437
participants (1)
-
opensuse-security@opensuse.org