Mailinglist Archive: opensuse-updates (50 mails)

< Previous Next >
openSUSE-SU-2012:1067-1: moderate: wireshark: update to 1.8.2
openSUSE Security Update: wireshark: update to 1.8.2

Announcement ID: openSUSE-SU-2012:1067-1
Rating: moderate
References: #776083
Cross-References: CVE-2012-4285 CVE-2012-4286 CVE-2012-4287
CVE-2012-4288 CVE-2012-4289 CVE-2012-4290
CVE-2012-4291 CVE-2012-4292 CVE-2012-4293
CVE-2012-4294 CVE-2012-4295 CVE-2012-4296
CVE-2012-4297 CVE-2012-4298
Affected Products:
openSUSE 12.2

An update that fixes 14 vulnerabilities is now available.


Wireshark was updated to 1.8.2:
* The DCP ETSI dissector could trigger a zero division.
(wnpa-sec-2012-13 CVE-2012-4285)
* The MongoDB dissector could go into a large loop.
(wnpa-sec-2012-14 CVE-2012-4287)
* The XTP dissector could go into an infinite loop.
(wnpa-sec-2012-15 CVE-2012-4288)
* The ERF dissector could overflow a buffer.
(wnpa-sec-2012-16 CVE-2012-4294 CVE-2012-4295)
* The AFP dissector could go into a large loop.
(wnpa-sec-2012-17 CVE-2012-4289)
* The RTPS2 dissector could overflow a buffer.
(wnpa-sec-2012-18 CVE-2012-4296)
* The GSM RLC MAC dissector could overflow a buffer.
(wnpa-sec-2012-19 CVE-2012-4297)
* The CIP dissector could exhaust system memory.
(wnpa-sec-2012-20 CVE-2012-4291)
* The STUN dissector could crash. (wnpa-sec-2012-21
* The EtherCAT Mailbox dissector could abort.
(wnpa-sec-2012-22 CVE-2012-4293)
* The CTDB dissector could go into a large loop.
(wnpa-sec-2012-23 CVE-2012-4290)
* The pcap-ng file parser could trigger a zero
division. (wnpa-sec-2012-24 CVE-2012-4286)
* The Ixia IxVeriWave file parser could overflow a
buffer. (wnpa-sec-2012-25 CVE-2012-4298) Further bug fixes
and updated protocol support as listed in:

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.2:

zypper in -t patch openSUSE-2012-540

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 12.2 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages