Oval Definition:oval:com.redhat.rhsa:def:20152393
Revision Date:2015-11-19Version:648
Title:RHSA-2015:2393: wireshark security, bug fix, and enhancement update (Moderate)
Description:The wireshark packages contain a network protocol analyzer used to capture
and browse the traffic running on a computer network.

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2015-2188, CVE-2015-2189, CVE-2015-2191,
CVE-2015-3810, CVE-2015-3811, CVE-2015-3812, CVE-2015-3813, CVE-2014-8710,
CVE-2014-8711, CVE-2014-8712, CVE-2014-8713, CVE-2014-8714, CVE-2015-0562,
CVE-2015-0563, CVE-2015-0564, CVE-2015-3182, CVE-2015-6243, CVE-2015-6244,
CVE-2015-6245, CVE-2015-6246, CVE-2015-6248)

The CVE-2015-3182 issue was discovered by Martin Žember of Red Hat.

The wireshark packages have been upgraded to upstream version 1.10.14,
which provides a number of bug fixes and enhancements over the previous
version. (BZ#1238676)

This update also fixes the following bug:

  • Prior to this update, when using the tshark utility to capture packets
    over the interface, tshark failed to create output files in the .pcap
    format even if it was specified using the "-F" option. This bug has been
    fixed, the "-F" option is now honored, and the result saved in the .pcap
    format as expected. (BZ#1227199)

    In addition, this update adds the following enhancement:

  • Previously, wireshark included only microseconds in the .pcapng format.
    With this update, wireshark supports nanosecond time stamp precision to
    allow for more accurate time stamps. (BZ#1213339)

    All wireshark users are advised to upgrade to these updated packages, which
    correct these issues and add these enhancements. All running instances of
    Wireshark must be restarted for the update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2014-8710
    CVE-2014-8711
    CVE-2014-8712
    CVE-2014-8713
    CVE-2014-8714
    CVE-2015-0562
    CVE-2015-0563
    CVE-2015-0564
    CVE-2015-2188
    CVE-2015-2189
    CVE-2015-2191
    CVE-2015-3182
    CVE-2015-3810
    CVE-2015-3811
    CVE-2015-3812
    CVE-2015-3813
    CVE-2015-6243
    CVE-2015-6244
    CVE-2015-6245
    CVE-2015-6246
    CVE-2015-6248
    RHSA-2015:2393
    RHSA-2015:2393-00
    RHSA-2015:2393-03
    Platform(s):Red Hat Enterprise Linux 7
    Red Hat Enterprise Linux 7 (please do not use for >= RHEL-7.5)
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • wireshark is earlier than 0:1.10.14-7.el7
  • AND wireshark is signed with Red Hat redhatrelease2 key
  • wireshark-devel is earlier than 0:1.10.14-7.el7
  • AND wireshark-devel is signed with Red Hat redhatrelease2 key
  • wireshark-gnome is earlier than 0:1.10.14-7.el7
  • AND wireshark-gnome is signed with Red Hat redhatrelease2 key
  • Definition Synopsis
  • Release Information
  • Red Hat Enterprise Linux 7 Client is installed
  • OR Red Hat Enterprise Linux 7 Server is installed
  • OR Red Hat Enterprise Linux 7 Workstation is installed
  • OR Red Hat Enterprise Linux 7 ComputeNode is installed
  • AND Package Information
  • wireshark-gnome is earlier than 0:1.10.14-7.el7
  • AND wireshark-gnome is signed with Red Hat redhatrelease2 key
  • OR
  • wireshark is earlier than 0:1.10.14-7.el7
  • AND wireshark is signed with Red Hat redhatrelease2 key
  • OR
  • wireshark-devel is earlier than 0:1.10.14-7.el7
  • AND wireshark-devel is signed with Red Hat redhatrelease2 key
  • BACK