Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1460

Опубликовано: 28 июл. 2015
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2015-1460: wireshark security, bug fix, and enhancement update (MODERATE)

[1.8.10-17.0.2]

  • Fix ocfs2 dissector (John Haxby) [orabug 21505640]

[1.8.10-17.0.1.el6]

  • Add oracle-ocfs2-network.patch to allow disassembly of OCFS2 interconnect

[1.8.10-17]

  • security patches
  • Resolves: CVE-2015-2189 CVE-2015-2191

[1.8.10-16]

  • security patches
  • Resolves: CVE-2014-8710 CVE-2014-8711 CVE-2014-8712 CVE-2014-8713 CVE-2014-8714 CVE-2015-0562 CVE-2015-0564

[1.8.10-15]

  • fix AES-GCM decoding
  • Related: rhbz#1095065

[1.8.10-14]

  • fix requires: shadow-utils
  • Resolves: rhbz#1121275

[1.8.10-13]

  • add elliptic curves decoding in DTLS HELLO
  • Resolves: rhbz#1131203

[1.8.10-12]

  • add AES-GCM decryption
  • Resolves: rhbz#1095065

[1.8.10-11]

  • fix reading from pipes
  • Resolves: rhbz#1104210

[1.8.10-10]

  • introduced nanosecond time precision
  • Resolves: rhbz#1146578

[1.8.10-9]

  • fix gtk2 required version
  • Resolves: rhbz#1160388

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

wireshark

1.8.10-17.0.2.el6

wireshark-devel

1.8.10-17.0.2.el6

wireshark-gnome

1.8.10-17.0.2.el6

Oracle Linux i686

wireshark

1.8.10-17.0.2.el6

wireshark-devel

1.8.10-17.0.2.el6

wireshark-gnome

1.8.10-17.0.2.el6

Oracle Linux sparc64

wireshark

1.8.10-17.0.2.el6

wireshark-devel

1.8.10-17.0.2.el6

wireshark-gnome

1.8.10-17.0.2.el6

Связанные уязвимости

oracle-oval
почти 10 лет назад

ELSA-2015-2393: wireshark security, bug fix, and enhancement update (MODERATE)

suse-cvrf
почти 11 лет назад

Security update for wireshark

suse-cvrf
почти 11 лет назад

Security update for wireshark

suse-cvrf
почти 11 лет назад

Security update for wireshark

ubuntu
почти 11 лет назад

The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.