Mailinglist Archive: opensuse-updates (68 mails)

< Previous Next >
openSUSE-SU-2012:0295-1: moderate: wireshark to 1.4.11
openSUSE Security Update: wireshark to 1.4.11
______________________________________________________________________________

Announcement ID: openSUSE-SU-2012:0295-1
Rating: moderate
References: #741187 #741188 #741190
Cross-References: CVE-2012-0041 CVE-2012-0042 CVE-2012-0043
CVE-2012-0066 CVE-2012-0067 CVE-2012-0068

Affected Products:
openSUSE 11.4
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available. It
includes one version update.

Description:

This update fixes the following security issues:

- 741187: multiple file parser vulnerabilities
(CVE-2012-0041)
- 741188: RLC dissector buffer overflow (CVE-2012-0043)
- 741190: NULL pointer vulnerabilities (CVE-2012-0042)
- CVE-2012-0066: DoS due to too large buffer alloc request
- CVE-2012-0067: DoS due to integer underflow and too large
buffer alloc. request
- CVE-2012-0068: memory corruption due to buffer underflow


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch wireshark-5742

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64) [New Version: 1.4.11]:

wireshark-1.4.11-0.2.3
wireshark-devel-1.4.11-0.2.3


References:

http://support.novell.com/security/cve/CVE-2012-0041.html
http://support.novell.com/security/cve/CVE-2012-0042.html
http://support.novell.com/security/cve/CVE-2012-0043.html
http://support.novell.com/security/cve/CVE-2012-0066.html
http://support.novell.com/security/cve/CVE-2012-0067.html
http://support.novell.com/security/cve/CVE-2012-0068.html
https://bugzilla.novell.com/741187
https://bugzilla.novell.com/741188
https://bugzilla.novell.com/741190


< Previous Next >
This Thread
  • No further messages