openSUSE-2015-683 Security update for wireshark moderate openSUSE Leap 42.1 Update wireshark was updated to version 1.12.8 to fix ten security issues. These security issues were fixed: - CVE-2015-6247: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 did not validate a certain offset value, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500). - CVE-2015-6246: The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6245: epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 used incorrect integer data types, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500). - CVE-2015-6244: The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6243: The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions (bsc#941500). - CVE-2015-6242: The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 did not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allowed remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet (bsc#941500). - CVE-2015-6241: The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 did not properly terminate a data structure after a failure to locate a number within a string, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437). - CVE-2015-6249: The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 did not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6248: The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 did not check whether the expected amount of data is available, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). wireshark-1.12.8-9.1.i586.rpm wireshark-1.12.8-9.1.src.rpm wireshark-debuginfo-1.12.8-9.1.i586.rpm wireshark-debugsource-1.12.8-9.1.i586.rpm wireshark-devel-1.12.8-9.1.i586.rpm wireshark-ui-gtk-1.12.8-9.1.i586.rpm wireshark-ui-gtk-debuginfo-1.12.8-9.1.i586.rpm wireshark-ui-qt-1.12.8-9.1.i586.rpm wireshark-ui-qt-debuginfo-1.12.8-9.1.i586.rpm wireshark-1.12.8-9.1.x86_64.rpm wireshark-debuginfo-1.12.8-9.1.x86_64.rpm wireshark-debugsource-1.12.8-9.1.x86_64.rpm wireshark-devel-1.12.8-9.1.x86_64.rpm wireshark-ui-gtk-1.12.8-9.1.x86_64.rpm wireshark-ui-gtk-debuginfo-1.12.8-9.1.x86_64.rpm wireshark-ui-qt-1.12.8-9.1.x86_64.rpm wireshark-ui-qt-debuginfo-1.12.8-9.1.x86_64.rpm openSUSE-2015-681 Security update for libressl moderate openSUSE Leap 42.1 Update libressl was updated to fix two security issues. These security issues were fixed: - CVE-2015-5333: Memory leak when decoding X.509 certificates (boo#950707) - CVE-2015-5334: Buffer overflow when decoding X.509 certificates (boo#950708) libcrypto36-2.3.0-3.1.i586.rpm libcrypto36-32bit-2.3.0-3.1.x86_64.rpm libcrypto36-debuginfo-2.3.0-3.1.i586.rpm libcrypto36-debuginfo-32bit-2.3.0-3.1.x86_64.rpm libressl-2.3.0-3.1.i586.rpm libressl-2.3.0-3.1.src.rpm libressl-debuginfo-2.3.0-3.1.i586.rpm libressl-debugsource-2.3.0-3.1.i586.rpm libressl-devel-2.3.0-3.1.i586.rpm libressl-devel-32bit-2.3.0-3.1.x86_64.rpm libressl-devel-doc-2.3.0-3.1.noarch.rpm libssl37-2.3.0-3.1.i586.rpm libssl37-32bit-2.3.0-3.1.x86_64.rpm libssl37-debuginfo-2.3.0-3.1.i586.rpm libssl37-debuginfo-32bit-2.3.0-3.1.x86_64.rpm libtls9-2.3.0-3.1.i586.rpm libtls9-32bit-2.3.0-3.1.x86_64.rpm libtls9-debuginfo-2.3.0-3.1.i586.rpm libtls9-debuginfo-32bit-2.3.0-3.1.x86_64.rpm libcrypto36-2.3.0-3.1.x86_64.rpm libcrypto36-debuginfo-2.3.0-3.1.x86_64.rpm libressl-2.3.0-3.1.x86_64.rpm libressl-debuginfo-2.3.0-3.1.x86_64.rpm libressl-debugsource-2.3.0-3.1.x86_64.rpm libressl-devel-2.3.0-3.1.x86_64.rpm libssl37-2.3.0-3.1.x86_64.rpm libssl37-debuginfo-2.3.0-3.1.x86_64.rpm libtls9-2.3.0-3.1.x86_64.rpm libtls9-debuginfo-2.3.0-3.1.x86_64.rpm openSUSE-2015-680 fix boo#948602 boo#948045 low openSUSE Leap 42.1 Update * boo#948602/cve#2015-7384: HTTP Denial of Service Vulnerability * boo#948045: addon-rpm.gypi wasn't installed * Leap: update nodejs to 4.2.1 from 0.12.7 nodejs-4.2.1-6.1.i586.rpm nodejs-4.2.1-6.1.src.rpm nodejs-debuginfo-4.2.1-6.1.i586.rpm nodejs-debugsource-4.2.1-6.1.i586.rpm nodejs-devel-4.2.1-6.1.i586.rpm nodejs-docs-4.2.1-6.1.noarch.rpm nodejs-npm-4.2.1-6.1.i586.rpm nodejs-4.2.1-6.1.x86_64.rpm nodejs-debuginfo-4.2.1-6.1.x86_64.rpm nodejs-debugsource-4.2.1-6.1.x86_64.rpm nodejs-devel-4.2.1-6.1.x86_64.rpm nodejs-npm-4.2.1-6.1.x86_64.rpm openSUSE-2015-684 Security update for squid moderate openSUSE Leap 42.1 Update squid was updated to fix one security issue. This security issue was fixed: - CVE-2014-9749: Nonce replay vulnerability in Digest authentication (bsc#949942). squid-3.3.13-3.1.i586.rpm squid-3.3.13-3.1.src.rpm squid-debuginfo-3.3.13-3.1.i586.rpm squid-debugsource-3.3.13-3.1.i586.rpm squid-3.3.13-3.1.x86_64.rpm squid-debuginfo-3.3.13-3.1.x86_64.rpm squid-debugsource-3.3.13-3.1.x86_64.rpm openSUSE-2015-702 Security update for util-linux moderate openSUSE Leap 42.1 Update util-linux was updated to fix one security issue. This security issue was fixed: - CVE-2015-5218: Prevent colcrt buffer overflow (bsc#949754). This non-security issue was fixed: - bsc#903440: Calendar "cal" crash with segmentation fault when execute in background. python-libmount-2.25-9.5.i586.rpm python-libmount-2.25-9.5.src.rpm python-libmount-debuginfo-2.25-9.5.i586.rpm python-libmount-debugsource-2.25-9.5.i586.rpm util-linux-systemd-2.25-9.1.i586.rpm util-linux-systemd-2.25-9.1.src.rpm util-linux-systemd-debuginfo-2.25-9.1.i586.rpm util-linux-systemd-debugsource-2.25-9.1.i586.rpm uuidd-2.25-9.1.i586.rpm uuidd-debuginfo-2.25-9.1.i586.rpm libblkid-devel-2.25-9.4.i586.rpm libblkid-devel-32bit-2.25-9.4.x86_64.rpm libblkid1-2.25-9.4.i586.rpm libblkid1-32bit-2.25-9.4.x86_64.rpm libblkid1-debuginfo-2.25-9.4.i586.rpm libblkid1-debuginfo-32bit-2.25-9.4.x86_64.rpm libmount-devel-2.25-9.4.i586.rpm libmount-devel-32bit-2.25-9.4.x86_64.rpm libmount1-2.25-9.4.i586.rpm libmount1-32bit-2.25-9.4.x86_64.rpm libmount1-debuginfo-2.25-9.4.i586.rpm libmount1-debuginfo-32bit-2.25-9.4.x86_64.rpm libsmartcols-devel-2.25-9.4.i586.rpm libsmartcols1-2.25-9.4.i586.rpm libsmartcols1-debuginfo-2.25-9.4.i586.rpm libuuid-devel-2.25-9.4.i586.rpm libuuid-devel-32bit-2.25-9.4.x86_64.rpm libuuid1-2.25-9.4.i586.rpm libuuid1-32bit-2.25-9.4.x86_64.rpm libuuid1-debuginfo-2.25-9.4.i586.rpm libuuid1-debuginfo-32bit-2.25-9.4.x86_64.rpm util-linux-2.25-9.4.i586.rpm util-linux-2.25-9.4.src.rpm util-linux-debuginfo-2.25-9.4.i586.rpm util-linux-debugsource-2.25-9.4.i586.rpm util-linux-lang-2.25-9.4.noarch.rpm python-libmount-2.25-9.5.x86_64.rpm python-libmount-debuginfo-2.25-9.5.x86_64.rpm python-libmount-debugsource-2.25-9.5.x86_64.rpm util-linux-systemd-2.25-9.1.x86_64.rpm util-linux-systemd-debuginfo-2.25-9.1.x86_64.rpm util-linux-systemd-debugsource-2.25-9.1.x86_64.rpm uuidd-2.25-9.1.x86_64.rpm uuidd-debuginfo-2.25-9.1.x86_64.rpm libblkid-devel-2.25-9.4.x86_64.rpm libblkid1-2.25-9.4.x86_64.rpm libblkid1-debuginfo-2.25-9.4.x86_64.rpm libmount-devel-2.25-9.4.x86_64.rpm libmount1-2.25-9.4.x86_64.rpm libmount1-debuginfo-2.25-9.4.x86_64.rpm libsmartcols-devel-2.25-9.4.x86_64.rpm libsmartcols1-2.25-9.4.x86_64.rpm libsmartcols1-debuginfo-2.25-9.4.x86_64.rpm libuuid-devel-2.25-9.4.x86_64.rpm libuuid1-2.25-9.4.x86_64.rpm libuuid1-debuginfo-2.25-9.4.x86_64.rpm util-linux-2.25-9.4.x86_64.rpm util-linux-debuginfo-2.25-9.4.x86_64.rpm util-linux-debugsource-2.25-9.4.x86_64.rpm openSUSE-2015-705 Security update for bouncycastle important openSUSE Leap 42.1 Update bouncycastle was updated to version 1.53 to fix one security issue. This security issue was fixed: - CVE-2015-7940: Invalid curve attack (bsc#951727). bouncycastle-1.53-16.1.noarch.rpm bouncycastle-1.53-16.1.src.rpm bouncycastle-javadoc-1.53-16.1.noarch.rpm openSUSE-2015-687 Security update for sudo moderate openSUSE Leap 42.1 Update sudo was updated to fix one security issue. This security issue was fixed: - CVE-2014-9680: Unsafe handling of TZ environment variable (bsc#917806). sudo-1.8.10p3-5.1.i586.rpm sudo-1.8.10p3-5.1.src.rpm sudo-debuginfo-1.8.10p3-5.1.i586.rpm sudo-debugsource-1.8.10p3-5.1.i586.rpm sudo-devel-1.8.10p3-5.1.i586.rpm sudo-test-1.8.10p3-5.1.i586.rpm sudo-1.8.10p3-5.1.x86_64.rpm sudo-debuginfo-1.8.10p3-5.1.x86_64.rpm sudo-debugsource-1.8.10p3-5.1.x86_64.rpm sudo-devel-1.8.10p3-5.1.x86_64.rpm sudo-test-1.8.10p3-5.1.x86_64.rpm openSUSE-2015-704 Security update for potrace moderate openSUSE Leap 42.1 Update potrace was updated to fix one security issue. This security issue was fixed: - CVE-2013-7437: Multiple integer overflows in potrace 1.11 allowed remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow (bsc#924904). libpotrace0-1.13-5.1.i586.rpm libpotrace0-debuginfo-1.13-5.1.i586.rpm potrace-1.13-5.1.i586.rpm potrace-1.13-5.1.src.rpm potrace-debuginfo-1.13-5.1.i586.rpm potrace-debugsource-1.13-5.1.i586.rpm potrace-devel-1.13-5.1.i586.rpm libpotrace0-1.13-5.1.x86_64.rpm libpotrace0-debuginfo-1.13-5.1.x86_64.rpm potrace-1.13-5.1.x86_64.rpm potrace-debuginfo-1.13-5.1.x86_64.rpm potrace-debugsource-1.13-5.1.x86_64.rpm potrace-devel-1.13-5.1.x86_64.rpm openSUSE-2015-685 Recommended udpate for pullin-bcm43xx-firmware and pullin-fluendo-mp3 low openSUSE Leap 42.1 Update This is the initial update to pullin bcm43xx-firmware and fluendo-mp3. (https://progress.opensuse.org/issues/9020) pullin-bcm43xx-firmware-1.0-4.1.noarch.rpm pullin-bcm43xx-firmware-1.0-4.1.src.rpm pullin-fluendo-mp3-13.2-4.1.noarch.rpm pullin-fluendo-mp3-13.2-4.1.src.rpm openSUSE-2015-698 Security update for audiofile low openSUSE Leap 42.1 Update audiofile was updated to fix one security issue. This security issue was fixed: - CVE-2015-7747: Overflow when changing both number of channels and sample format (bsc#949399). audiofile-0.3.6-9.1.i586.rpm audiofile-0.3.6-9.1.src.rpm audiofile-debuginfo-0.3.6-9.1.i586.rpm audiofile-debugsource-0.3.6-9.1.i586.rpm audiofile-devel-0.3.6-9.1.i586.rpm audiofile-devel-32bit-0.3.6-9.1.x86_64.rpm audiofile-doc-0.3.6-9.1.i586.rpm libaudiofile1-0.3.6-9.1.i586.rpm libaudiofile1-32bit-0.3.6-9.1.x86_64.rpm libaudiofile1-debuginfo-0.3.6-9.1.i586.rpm libaudiofile1-debuginfo-32bit-0.3.6-9.1.x86_64.rpm audiofile-0.3.6-9.1.x86_64.rpm audiofile-debuginfo-0.3.6-9.1.x86_64.rpm audiofile-debugsource-0.3.6-9.1.x86_64.rpm audiofile-devel-0.3.6-9.1.x86_64.rpm audiofile-doc-0.3.6-9.1.x86_64.rpm libaudiofile1-0.3.6-9.1.x86_64.rpm libaudiofile1-debuginfo-0.3.6-9.1.x86_64.rpm openSUSE-2015-706 Recommended update for clamav-database moderate openSUSE Leap 42.1 Update clamav database refresh for november 3rd. clamav-database-201511031116-3.1.noarch.rpm clamav-database-201511031116-3.1.src.rpm