Security update for wireshark
Announcement ID: | SUSE-SU-2017:1664-1 |
Rating: | moderate |
References: | #1042298 #1042299 #1042300 #1042301 #1042302 #1042303 #1042304 #1042305 #1042306 #1042307 #1042308 #1042309 |
Affected Products: |
An update that fixes 12 vulnerabilities is now available.
Description:
The network analysis tool wireshark was updated to version 2.0.13 to fix
the following issues:
* CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22)
(bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23)
(bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24)
(bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25)
(bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26)
(bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27)
(bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28)
(bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29)
(bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
* CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33)
(bsc#1042306)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-wireshark-13170=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-wireshark-13170=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-wireshark-13170=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
- wireshark-devel-2.0.13-39.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
- wireshark-2.0.13-39.1
- wireshark-gtk-2.0.13-39.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
- wireshark-2.0.13-39.1
- wireshark-gtk-2.0.13-39.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
- wireshark-debuginfo-2.0.13-39.1
- wireshark-debugsource-2.0.13-39.1
References:
- https://www.suse.com/security/cve/CVE-2017-9343.html
- https://www.suse.com/security/cve/CVE-2017-9344.html
- https://www.suse.com/security/cve/CVE-2017-9345.html
- https://www.suse.com/security/cve/CVE-2017-9346.html
- https://www.suse.com/security/cve/CVE-2017-9347.html
- https://www.suse.com/security/cve/CVE-2017-9348.html
- https://www.suse.com/security/cve/CVE-2017-9349.html
- https://www.suse.com/security/cve/CVE-2017-9350.html
- https://www.suse.com/security/cve/CVE-2017-9351.html
- https://www.suse.com/security/cve/CVE-2017-9352.html
- https://www.suse.com/security/cve/CVE-2017-9353.html
- https://www.suse.com/security/cve/CVE-2017-9354.html
- https://bugzilla.suse.com/1042298
- https://bugzilla.suse.com/1042299
- https://bugzilla.suse.com/1042300
- https://bugzilla.suse.com/1042301
- https://bugzilla.suse.com/1042302
- https://bugzilla.suse.com/1042303
- https://bugzilla.suse.com/1042304
- https://bugzilla.suse.com/1042305
- https://bugzilla.suse.com/1042306
- https://bugzilla.suse.com/1042307
- https://bugzilla.suse.com/1042308
- https://bugzilla.suse.com/1042309