openSUSE-2015-683
Security update for wireshark
moderate
openSUSE Leap 42.1 Update
wireshark was updated to version 1.12.8 to fix ten security issues.
These security issues were fixed:
- CVE-2015-6247: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 did not validate a certain offset value, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500).
- CVE-2015-6246: The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500).
- CVE-2015-6245: epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 used incorrect integer data types, which allowed remote attackers to cause a denial of service (infinite loop) via a crafted packet (bsc#941500).
- CVE-2015-6244: The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500).
- CVE-2015-6243: The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions (bsc#941500).
- CVE-2015-6242: The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 did not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allowed remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet (bsc#941500).
- CVE-2015-6241: The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 did not properly terminate a data structure after a failure to locate a number within a string, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500).
- CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437).
- CVE-2015-6249: The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 did not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500).
- CVE-2015-6248: The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 did not check whether the expected amount of data is available, which allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#941500).
wireshark-1.12.8-9.1.i586.rpm
wireshark-1.12.8-9.1.src.rpm
wireshark-debuginfo-1.12.8-9.1.i586.rpm
wireshark-debugsource-1.12.8-9.1.i586.rpm
wireshark-devel-1.12.8-9.1.i586.rpm
wireshark-ui-gtk-1.12.8-9.1.i586.rpm
wireshark-ui-gtk-debuginfo-1.12.8-9.1.i586.rpm
wireshark-ui-qt-1.12.8-9.1.i586.rpm
wireshark-ui-qt-debuginfo-1.12.8-9.1.i586.rpm
wireshark-1.12.8-9.1.x86_64.rpm
wireshark-debuginfo-1.12.8-9.1.x86_64.rpm
wireshark-debugsource-1.12.8-9.1.x86_64.rpm
wireshark-devel-1.12.8-9.1.x86_64.rpm
wireshark-ui-gtk-1.12.8-9.1.x86_64.rpm
wireshark-ui-gtk-debuginfo-1.12.8-9.1.x86_64.rpm
wireshark-ui-qt-1.12.8-9.1.x86_64.rpm
wireshark-ui-qt-debuginfo-1.12.8-9.1.x86_64.rpm
openSUSE-2015-681
Security update for libressl
moderate
openSUSE Leap 42.1 Update
libressl was updated to fix two security issues.
These security issues were fixed:
- CVE-2015-5333: Memory leak when decoding X.509 certificates (boo#950707)
- CVE-2015-5334: Buffer overflow when decoding X.509 certificates (boo#950708)
libcrypto36-2.3.0-3.1.i586.rpm
libcrypto36-32bit-2.3.0-3.1.x86_64.rpm
libcrypto36-debuginfo-2.3.0-3.1.i586.rpm
libcrypto36-debuginfo-32bit-2.3.0-3.1.x86_64.rpm
libressl-2.3.0-3.1.i586.rpm
libressl-2.3.0-3.1.src.rpm
libressl-debuginfo-2.3.0-3.1.i586.rpm
libressl-debugsource-2.3.0-3.1.i586.rpm
libressl-devel-2.3.0-3.1.i586.rpm
libressl-devel-32bit-2.3.0-3.1.x86_64.rpm
libressl-devel-doc-2.3.0-3.1.noarch.rpm
libssl37-2.3.0-3.1.i586.rpm
libssl37-32bit-2.3.0-3.1.x86_64.rpm
libssl37-debuginfo-2.3.0-3.1.i586.rpm
libssl37-debuginfo-32bit-2.3.0-3.1.x86_64.rpm
libtls9-2.3.0-3.1.i586.rpm
libtls9-32bit-2.3.0-3.1.x86_64.rpm
libtls9-debuginfo-2.3.0-3.1.i586.rpm
libtls9-debuginfo-32bit-2.3.0-3.1.x86_64.rpm
libcrypto36-2.3.0-3.1.x86_64.rpm
libcrypto36-debuginfo-2.3.0-3.1.x86_64.rpm
libressl-2.3.0-3.1.x86_64.rpm
libressl-debuginfo-2.3.0-3.1.x86_64.rpm
libressl-debugsource-2.3.0-3.1.x86_64.rpm
libressl-devel-2.3.0-3.1.x86_64.rpm
libssl37-2.3.0-3.1.x86_64.rpm
libssl37-debuginfo-2.3.0-3.1.x86_64.rpm
libtls9-2.3.0-3.1.x86_64.rpm
libtls9-debuginfo-2.3.0-3.1.x86_64.rpm
openSUSE-2015-680
fix boo#948602 boo#948045
low
openSUSE Leap 42.1 Update
* boo#948602/cve#2015-7384: HTTP Denial of Service Vulnerability
* boo#948045: addon-rpm.gypi wasn't installed
* Leap: update nodejs to 4.2.1 from 0.12.7
nodejs-4.2.1-6.1.i586.rpm
nodejs-4.2.1-6.1.src.rpm
nodejs-debuginfo-4.2.1-6.1.i586.rpm
nodejs-debugsource-4.2.1-6.1.i586.rpm
nodejs-devel-4.2.1-6.1.i586.rpm
nodejs-docs-4.2.1-6.1.noarch.rpm
nodejs-npm-4.2.1-6.1.i586.rpm
nodejs-4.2.1-6.1.x86_64.rpm
nodejs-debuginfo-4.2.1-6.1.x86_64.rpm
nodejs-debugsource-4.2.1-6.1.x86_64.rpm
nodejs-devel-4.2.1-6.1.x86_64.rpm
nodejs-npm-4.2.1-6.1.x86_64.rpm
openSUSE-2015-684
Security update for squid
moderate
openSUSE Leap 42.1 Update
squid was updated to fix one security issue.
This security issue was fixed:
- CVE-2014-9749: Nonce replay vulnerability in Digest authentication (bsc#949942).
squid-3.3.13-3.1.i586.rpm
squid-3.3.13-3.1.src.rpm
squid-debuginfo-3.3.13-3.1.i586.rpm
squid-debugsource-3.3.13-3.1.i586.rpm
squid-3.3.13-3.1.x86_64.rpm
squid-debuginfo-3.3.13-3.1.x86_64.rpm
squid-debugsource-3.3.13-3.1.x86_64.rpm
openSUSE-2015-687
Security update for sudo
moderate
openSUSE Leap 42.1 Update
sudo was updated to fix one security issue.
This security issue was fixed:
- CVE-2014-9680: Unsafe handling of TZ environment variable (bsc#917806).
sudo-1.8.10p3-5.1.i586.rpm
sudo-1.8.10p3-5.1.src.rpm
sudo-debuginfo-1.8.10p3-5.1.i586.rpm
sudo-debugsource-1.8.10p3-5.1.i586.rpm
sudo-devel-1.8.10p3-5.1.i586.rpm
sudo-test-1.8.10p3-5.1.i586.rpm
sudo-1.8.10p3-5.1.x86_64.rpm
sudo-debuginfo-1.8.10p3-5.1.x86_64.rpm
sudo-debugsource-1.8.10p3-5.1.x86_64.rpm
sudo-devel-1.8.10p3-5.1.x86_64.rpm
sudo-test-1.8.10p3-5.1.x86_64.rpm
openSUSE-2015-685
Recommended udpate for pullin-bcm43xx-firmware and pullin-fluendo-mp3
low
openSUSE Leap 42.1 Update
This is the initial update to pullin bcm43xx-firmware and fluendo-mp3. (https://progress.opensuse.org/issues/9020)
pullin-bcm43xx-firmware-1.0-4.1.noarch.rpm
pullin-bcm43xx-firmware-1.0-4.1.src.rpm
pullin-fluendo-mp3-13.2-4.1.noarch.rpm
pullin-fluendo-mp3-13.2-4.1.src.rpm