SCIENTIFIC-LINUX-ERRATA Archives

October 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 22 Oct 2014 17:03:10 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (40 lines)
Synopsis:          Moderate: wireshark security update
Advisory ID:       SLSA-2014:1677-1
Issue Date:        2014-10-21
CVE Numbers:       CVE-2014-6429
                   CVE-2014-6430
                   CVE-2014-6431
                   CVE-2014-6432
                   CVE-2014-6428
                   CVE-2014-6425
                   CVE-2014-6423
                   CVE-2014-6421
                   CVE-2014-6422
--

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422,
CVE-2014-6423, CVE-2014-6425, CVE-2014-6428)

All running instances of Wireshark must be restarted for the update to
take effect.
--

SL5
  x86_64
    wireshark-1.0.15-7.el5_11.x86_64.rpm
    wireshark-debuginfo-1.0.15-7.el5_11.x86_64.rpm
    wireshark-gnome-1.0.15-7.el5_11.x86_64.rpm
  i386
    wireshark-1.0.15-7.el5_11.i386.rpm
    wireshark-debuginfo-1.0.15-7.el5_11.i386.rpm
    wireshark-gnome-1.0.15-7.el5_11.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2