openSUSE-2015-683 Security update for wireshark moderate openSUSE Leap 42.1 Update wireshark was updated to version 1.12.8 to fix ten security issues. These security issues were fixed: - CVE-2015-6247: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 did not validate a certain offset value, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500). - CVE-2015-6246: The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6245: epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 used incorrect integer data types, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500). - CVE-2015-6244: The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6243: The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions (bsc#941500). - CVE-2015-6242: The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 did not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allowed remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet (bsc#941500). - CVE-2015-6241: The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 did not properly terminate a data structure after a failure to locate a number within a string, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437). - CVE-2015-6249: The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 did not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). - CVE-2015-6248: The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 did not check whether the expected amount of data is available, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500). wireshark-1.12.8-9.1.i586.rpm wireshark-1.12.8-9.1.src.rpm wireshark-debuginfo-1.12.8-9.1.i586.rpm wireshark-debugsource-1.12.8-9.1.i586.rpm wireshark-devel-1.12.8-9.1.i586.rpm wireshark-ui-gtk-1.12.8-9.1.i586.rpm wireshark-ui-gtk-debuginfo-1.12.8-9.1.i586.rpm wireshark-ui-qt-1.12.8-9.1.i586.rpm wireshark-ui-qt-debuginfo-1.12.8-9.1.i586.rpm wireshark-1.12.8-9.1.x86_64.rpm wireshark-debuginfo-1.12.8-9.1.x86_64.rpm wireshark-debugsource-1.12.8-9.1.x86_64.rpm wireshark-devel-1.12.8-9.1.x86_64.rpm wireshark-ui-gtk-1.12.8-9.1.x86_64.rpm wireshark-ui-gtk-debuginfo-1.12.8-9.1.x86_64.rpm wireshark-ui-qt-1.12.8-9.1.x86_64.rpm wireshark-ui-qt-debuginfo-1.12.8-9.1.x86_64.rpm openSUSE-2015-681 Security update for libressl moderate openSUSE Leap 42.1 Update libressl was updated to fix two security issues. These security issues were fixed: - CVE-2015-5333: Memory leak when decoding X.509 certificates (boo#950707) - CVE-2015-5334: Buffer overflow when decoding X.509 certificates (boo#950708) libcrypto36-2.3.0-3.1.i586.rpm libcrypto36-32bit-2.3.0-3.1.x86_64.rpm libcrypto36-debuginfo-2.3.0-3.1.i586.rpm libcrypto36-debuginfo-32bit-2.3.0-3.1.x86_64.rpm libressl-2.3.0-3.1.i586.rpm libressl-2.3.0-3.1.src.rpm libressl-debuginfo-2.3.0-3.1.i586.rpm libressl-debugsource-2.3.0-3.1.i586.rpm libressl-devel-2.3.0-3.1.i586.rpm libressl-devel-32bit-2.3.0-3.1.x86_64.rpm libressl-devel-doc-2.3.0-3.1.noarch.rpm libssl37-2.3.0-3.1.i586.rpm libssl37-32bit-2.3.0-3.1.x86_64.rpm libssl37-debuginfo-2.3.0-3.1.i586.rpm libssl37-debuginfo-32bit-2.3.0-3.1.x86_64.rpm libtls9-2.3.0-3.1.i586.rpm libtls9-32bit-2.3.0-3.1.x86_64.rpm libtls9-debuginfo-2.3.0-3.1.i586.rpm libtls9-debuginfo-32bit-2.3.0-3.1.x86_64.rpm libcrypto36-2.3.0-3.1.x86_64.rpm libcrypto36-debuginfo-2.3.0-3.1.x86_64.rpm libressl-2.3.0-3.1.x86_64.rpm libressl-debuginfo-2.3.0-3.1.x86_64.rpm libressl-debugsource-2.3.0-3.1.x86_64.rpm libressl-devel-2.3.0-3.1.x86_64.rpm libssl37-2.3.0-3.1.x86_64.rpm libssl37-debuginfo-2.3.0-3.1.x86_64.rpm libtls9-2.3.0-3.1.x86_64.rpm libtls9-debuginfo-2.3.0-3.1.x86_64.rpm openSUSE-2015-680 fix boo#948602 boo#948045 low openSUSE Leap 42.1 Update * boo#948602/cve#2015-7384: HTTP Denial of Service Vulnerability * boo#948045: addon-rpm.gypi wasn't installed * Leap: update nodejs to 4.2.1 from 0.12.7 nodejs-4.2.1-6.1.i586.rpm nodejs-4.2.1-6.1.src.rpm nodejs-debuginfo-4.2.1-6.1.i586.rpm nodejs-debugsource-4.2.1-6.1.i586.rpm nodejs-devel-4.2.1-6.1.i586.rpm nodejs-docs-4.2.1-6.1.noarch.rpm nodejs-npm-4.2.1-6.1.i586.rpm nodejs-4.2.1-6.1.x86_64.rpm nodejs-debuginfo-4.2.1-6.1.x86_64.rpm nodejs-debugsource-4.2.1-6.1.x86_64.rpm nodejs-devel-4.2.1-6.1.x86_64.rpm nodejs-npm-4.2.1-6.1.x86_64.rpm openSUSE-2015-684 Security update for squid moderate openSUSE Leap 42.1 Update squid was updated to fix one security issue. This security issue was fixed: - CVE-2014-9749: Nonce replay vulnerability in Digest authentication (bsc#949942). squid-3.3.13-3.1.i586.rpm squid-3.3.13-3.1.src.rpm squid-debuginfo-3.3.13-3.1.i586.rpm squid-debugsource-3.3.13-3.1.i586.rpm squid-3.3.13-3.1.x86_64.rpm squid-debuginfo-3.3.13-3.1.x86_64.rpm squid-debugsource-3.3.13-3.1.x86_64.rpm openSUSE-2015-687 Security update for sudo moderate openSUSE Leap 42.1 Update sudo was updated to fix one security issue. This security issue was fixed: - CVE-2014-9680: Unsafe handling of TZ environment variable (bsc#917806). sudo-1.8.10p3-5.1.i586.rpm sudo-1.8.10p3-5.1.src.rpm sudo-debuginfo-1.8.10p3-5.1.i586.rpm sudo-debugsource-1.8.10p3-5.1.i586.rpm sudo-devel-1.8.10p3-5.1.i586.rpm sudo-test-1.8.10p3-5.1.i586.rpm sudo-1.8.10p3-5.1.x86_64.rpm sudo-debuginfo-1.8.10p3-5.1.x86_64.rpm sudo-debugsource-1.8.10p3-5.1.x86_64.rpm sudo-devel-1.8.10p3-5.1.x86_64.rpm sudo-test-1.8.10p3-5.1.x86_64.rpm openSUSE-2015-685 Recommended udpate for pullin-bcm43xx-firmware and pullin-fluendo-mp3 low openSUSE Leap 42.1 Update This is the initial update to pullin bcm43xx-firmware and fluendo-mp3. (https://progress.opensuse.org/issues/9020) pullin-bcm43xx-firmware-1.0-4.1.noarch.rpm pullin-bcm43xx-firmware-1.0-4.1.src.rpm pullin-fluendo-mp3-13.2-4.1.noarch.rpm pullin-fluendo-mp3-13.2-4.1.src.rpm