Skip to navigation

Security Advisory Moderate: wireshark security, bug fix, and enhancement update

Advisory: RHSA-2013:1569-2
Type: Security Advisory
Severity: Moderate
Issued on: 2013-11-21
Last updated on: 2013-11-21
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2012-2392
CVE-2012-3825
CVE-2012-4285
CVE-2012-4288
CVE-2012-4289
CVE-2012-4290
CVE-2012-4291
CVE-2012-4292
CVE-2012-5595
CVE-2012-5597
CVE-2012-5598
CVE-2012-5599
CVE-2012-5600
CVE-2012-6056
CVE-2012-6059
CVE-2012-6060
CVE-2012-6061
CVE-2012-6062
CVE-2013-3557
CVE-2013-3559
CVE-2013-3561
CVE-2013-4081
CVE-2013-4083
CVE-2013-4927
CVE-2013-4931
CVE-2013-4932
CVE-2013-4933
CVE-2013-4934
CVE-2013-4935
CVE-2013-4936
CVE-2013-5721

Details

Updated wireshark packages that fix multiple security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Wireshark, previously known as Ethereal, is a network protocol analyzer.
It is used to capture and browse the traffic running on a computer network.

Two flaws were found in Wireshark. If Wireshark read a malformed packet off
a network or opened a malicious dump file, it could crash or, possibly,
execute arbitrary code as the user running Wireshark. (CVE-2013-3559,
CVE-2013-4083)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2012-2392, CVE-2012-3825, CVE-2012-4285,
CVE-2012-4288, CVE-2012-4289, CVE-2012-4290, CVE-2012-4291, CVE-2012-4292,
CVE-2012-5595, CVE-2012-5597, CVE-2012-5598, CVE-2012-5599, CVE-2012-5600,
CVE-2012-6056, CVE-2012-6059, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,
CVE-2013-3557, CVE-2013-3561, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931,
CVE-2013-4932, CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-4936,
CVE-2013-5721)

The wireshark packages have been upgraded to upstream version 1.8.10, which
provides a number of bug fixes and enhancements over the previous versions.
For more information on the bugs fixed, enhancements included, and
supported protocols introduced, refer to the Wireshark Release Notes,
linked to in the References. (BZ#711024)

This update also fixes the following bugs:

* Previously, Wireshark did not parse the RECLAIM-COMPLETE opcode when
inspecting traffic generated by NFSv4.1. A patch has been provided to
enable the parsing of the RECLAIM_COMPLETE opcode, and Wireshark is now
able to properly dissect and handle NFSv4.1 traffic. (BZ#750712)

* Prior to this update, frame arrival times in a text file were reported
one hour ahead from the timestamps in the packet capture file.
This resulted in various failures being reported by the dfilter-test.py
test suite. To fix this bug, frame arrival timestamps have been shifted by
one hour, thus fixing this bug. (BZ#832021)

* The "tshark -D" command returned output to STDERR instead of STDOUT,
which could break scripts that are parsing the "tshark -D" output. This bug
has been fixed, and the "tshark -D" command now writes output data to a
correct standard stream. (BZ#1004636)

* Due to an array overrun, Wireshark could experience undefined program
behavior or could unexpectedly terminate. With this update, proper array
handling ensures Wireshark no longer crashes in the described scenario.
(BZ#715560)

* Previously, the dftest and randpkt command line utilities lacked manual
pages. This update adds proper manual pages for both utilities. (BZ#659661)

In addition, this update adds the following enhancements:

* With this update, Wireshark is able to properly dissect and handle
InfiniBand and GlusterFS traffic. (BZ#699636, BZ#858976)

All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements. All running instances of Wireshark must be restarted for the
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
wireshark-1.8.10-4.el6.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 1c8cded16fec82b27745eb4a47f879bf
SHA-256: 4be2faf865c16e011643e0e8a0962a676a13477b40725c9e4321d3cda3ebd6a1
 
IA-32:
wireshark-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 23e9d422cf938bef2e4e1ede00439978
SHA-256: 47de6d9d3f17b57a96610f73ef63d054c40bca5a8acb3e470a8b87a48b969806
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6e9ed778ce1d56d49210dfd0cc5a7414
SHA-256: cf6876c968d3302acca659316049616934feb6e244e0411dc0f6bde7f2266e95
wireshark-devel-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b9be85cbbba5c3399391a35e36306bd0
SHA-256: 0c748a6353dc53f28a88af318ba97e3a431731603caac3868589efc471b0a49e
wireshark-gnome-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: eb62dffb5812ce3403307a3031fee6d6
SHA-256: 9608c952e51de2823ec37ced1c9c7f9c656fb7dfac7d26c859f9c6dd85b43790
 
x86_64:
wireshark-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 23e9d422cf938bef2e4e1ede00439978
SHA-256: 47de6d9d3f17b57a96610f73ef63d054c40bca5a8acb3e470a8b87a48b969806
wireshark-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 210ff9039f194a24cb784846619dfbcf
SHA-256: 639996bf537c28cd12a2c5126915b33a8ad5814a0bf1c2a5433292078645c538
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6e9ed778ce1d56d49210dfd0cc5a7414
SHA-256: cf6876c968d3302acca659316049616934feb6e244e0411dc0f6bde7f2266e95
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 8f90b42e209c6c3bc86e32be12ccb743
SHA-256: 28898b751b29d21d527e76f196898af7704a7c30c7201ac969b3c754fa5b0ecd
wireshark-devel-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b9be85cbbba5c3399391a35e36306bd0
SHA-256: 0c748a6353dc53f28a88af318ba97e3a431731603caac3868589efc471b0a49e
wireshark-devel-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a46ad5109e8816bca277dc6db6d3144d
SHA-256: a2b7d851bbe03a9db7a5a144776957e39e74f4a1157c938e86aa3abddef57c86
wireshark-gnome-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: b27073c13a7bbe5b489bd85d1603883b
SHA-256: 46b58f29941e7ec3ac9c45b6228a8c4a55fabbf2d0c1f38e4ce715cc0c4f130c
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
wireshark-1.8.10-4.el6.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 1c8cded16fec82b27745eb4a47f879bf
SHA-256: 4be2faf865c16e011643e0e8a0962a676a13477b40725c9e4321d3cda3ebd6a1
 
IA-32:
wireshark-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 23e9d422cf938bef2e4e1ede00439978
SHA-256: 47de6d9d3f17b57a96610f73ef63d054c40bca5a8acb3e470a8b87a48b969806
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6e9ed778ce1d56d49210dfd0cc5a7414
SHA-256: cf6876c968d3302acca659316049616934feb6e244e0411dc0f6bde7f2266e95
wireshark-devel-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b9be85cbbba5c3399391a35e36306bd0
SHA-256: 0c748a6353dc53f28a88af318ba97e3a431731603caac3868589efc471b0a49e
wireshark-gnome-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: eb62dffb5812ce3403307a3031fee6d6
SHA-256: 9608c952e51de2823ec37ced1c9c7f9c656fb7dfac7d26c859f9c6dd85b43790
 
PPC:
wireshark-1.8.10-4.el6.ppc.rpm
File outdated by:  RHSA-2014:0342
    MD5: ef744965c27ef1d3d914a8090c32adc1
SHA-256: 4371244b7458ec99caafcd2fdee72cdf745acaa6aede8eff975c0bc053d01f39
wireshark-1.8.10-4.el6.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: cb218616aafa604b50f8780d5b10f6b7
SHA-256: e0b048e42e48e2ff131d800c20d1e938f1ec8c3fb8bed6fc304c2678da77f935
wireshark-debuginfo-1.8.10-4.el6.ppc.rpm
File outdated by:  RHSA-2014:0342
    MD5: ef7af0256ad672c8596f5059c6869e11
SHA-256: ae16f5e575acecee1995290dc06539cee559169ef438218007d7ab8a1efca405
wireshark-debuginfo-1.8.10-4.el6.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 8b76b975da5dacbadf64c99360e42159
SHA-256: 75d322cf84a14585f0b5d9a15384a6f19f79cea5c2273d29fb0cfdcaff1c7600
wireshark-devel-1.8.10-4.el6.ppc.rpm
File outdated by:  RHSA-2014:0342
    MD5: 70bc115b9437f23ba26ebbf695870c80
SHA-256: 41ad4f3389047beabbac883dc4f6d34c5928a74039b9c1e4f1a64ba4d1ceba44
wireshark-devel-1.8.10-4.el6.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 320a57666f5fa83d16a22e0c6a215df1
SHA-256: 4d6ffb5c69894cd4a30f0da798e1d28a7b05c93cb1eb49d2e2bf93b26aa296b3
wireshark-gnome-1.8.10-4.el6.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: e7eabe2b41e61ddc91490fd5715bc64d
SHA-256: 8b1dead4c42d53cbe38add99b500b9a934beca98ee19ae9845f74f7ca7dce737
 
s390x:
wireshark-1.8.10-4.el6.s390.rpm
File outdated by:  RHSA-2014:0342
    MD5: 487e3c3f0e6a4f057557b06045b948fe
SHA-256: 9ccc9d89c3184c21aafe21742c12f2b8b80bb1f9cba0d33eca3eb566cad9c03a
wireshark-1.8.10-4.el6.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: e79e5f5b12699eff307ef2f8b97cf37c
SHA-256: 433d3c9d82552da82c05f9e6df3771511071de50c9c0c3994538a89691fde48b
wireshark-debuginfo-1.8.10-4.el6.s390.rpm
File outdated by:  RHSA-2014:0342
    MD5: bd08b0d3a3ff704a1efd6b85573d3706
SHA-256: 95aa5ecc100c3f5c01642bc0c9cbbdcee4b90a8558842774a3134534e06257cf
wireshark-debuginfo-1.8.10-4.el6.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: 9e1c6b4b0152729cd616eb1542872b6c
SHA-256: 86c7038aebcf587d2ecccc18597f13756c45760f55a142de1b41b8b69352a332
wireshark-devel-1.8.10-4.el6.s390.rpm
File outdated by:  RHSA-2014:0342
    MD5: 1beb39baaad8cff656d41e75b140b032
SHA-256: af8e06e62d893f4828c30663edaa42c0f7be34df7c6a6fc8a3e7ce1ee934e8a0
wireshark-devel-1.8.10-4.el6.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: 80b5c3729af99495f4e55d30eb074a40
SHA-256: 3e2489814e4763d9ffbefee4f7788cfcef9a9b451b2a120180f06bb03f2f4875
wireshark-gnome-1.8.10-4.el6.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: 75bdba29f259515b239af38e3ae72ff1
SHA-256: 29711fdf3f029785b1472ffa1f1cb5a40d8a990c93d282529806bc3afe55c1a3
 
x86_64:
wireshark-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 23e9d422cf938bef2e4e1ede00439978
SHA-256: 47de6d9d3f17b57a96610f73ef63d054c40bca5a8acb3e470a8b87a48b969806
wireshark-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 210ff9039f194a24cb784846619dfbcf
SHA-256: 639996bf537c28cd12a2c5126915b33a8ad5814a0bf1c2a5433292078645c538
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6e9ed778ce1d56d49210dfd0cc5a7414
SHA-256: cf6876c968d3302acca659316049616934feb6e244e0411dc0f6bde7f2266e95
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 8f90b42e209c6c3bc86e32be12ccb743
SHA-256: 28898b751b29d21d527e76f196898af7704a7c30c7201ac969b3c754fa5b0ecd
wireshark-devel-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b9be85cbbba5c3399391a35e36306bd0
SHA-256: 0c748a6353dc53f28a88af318ba97e3a431731603caac3868589efc471b0a49e
wireshark-devel-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a46ad5109e8816bca277dc6db6d3144d
SHA-256: a2b7d851bbe03a9db7a5a144776957e39e74f4a1157c938e86aa3abddef57c86
wireshark-gnome-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: b27073c13a7bbe5b489bd85d1603883b
SHA-256: 46b58f29941e7ec3ac9c45b6228a8c4a55fabbf2d0c1f38e4ce715cc0c4f130c
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
wireshark-1.8.10-4.el6.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 1c8cded16fec82b27745eb4a47f879bf
SHA-256: 4be2faf865c16e011643e0e8a0962a676a13477b40725c9e4321d3cda3ebd6a1
 
IA-32:
wireshark-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 23e9d422cf938bef2e4e1ede00439978
SHA-256: 47de6d9d3f17b57a96610f73ef63d054c40bca5a8acb3e470a8b87a48b969806
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6e9ed778ce1d56d49210dfd0cc5a7414
SHA-256: cf6876c968d3302acca659316049616934feb6e244e0411dc0f6bde7f2266e95
wireshark-devel-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b9be85cbbba5c3399391a35e36306bd0
SHA-256: 0c748a6353dc53f28a88af318ba97e3a431731603caac3868589efc471b0a49e
wireshark-gnome-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: eb62dffb5812ce3403307a3031fee6d6
SHA-256: 9608c952e51de2823ec37ced1c9c7f9c656fb7dfac7d26c859f9c6dd85b43790
 
x86_64:
wireshark-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 23e9d422cf938bef2e4e1ede00439978
SHA-256: 47de6d9d3f17b57a96610f73ef63d054c40bca5a8acb3e470a8b87a48b969806
wireshark-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 210ff9039f194a24cb784846619dfbcf
SHA-256: 639996bf537c28cd12a2c5126915b33a8ad5814a0bf1c2a5433292078645c538
wireshark-debuginfo-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6e9ed778ce1d56d49210dfd0cc5a7414
SHA-256: cf6876c968d3302acca659316049616934feb6e244e0411dc0f6bde7f2266e95
wireshark-debuginfo-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 8f90b42e209c6c3bc86e32be12ccb743
SHA-256: 28898b751b29d21d527e76f196898af7704a7c30c7201ac969b3c754fa5b0ecd
wireshark-devel-1.8.10-4.el6.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b9be85cbbba5c3399391a35e36306bd0
SHA-256: 0c748a6353dc53f28a88af318ba97e3a431731603caac3868589efc471b0a49e
wireshark-devel-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a46ad5109e8816bca277dc6db6d3144d
SHA-256: a2b7d851bbe03a9db7a5a144776957e39e74f4a1157c938e86aa3abddef57c86
wireshark-gnome-1.8.10-4.el6.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: b27073c13a7bbe5b489bd85d1603883b
SHA-256: 46b58f29941e7ec3ac9c45b6228a8c4a55fabbf2d0c1f38e4ce715cc0c4f130c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1007197 - CVE-2013-5721 wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)
659661 - dftest and randpkt does not have a man page
711024 - Rebase wireshark to latest upstream stable release
715560 - Defects revealed by Coverity scan
750712 - NFS4.1: parse RECLAIM_COMPLETE opcode
824411 - CVE-2012-2392 wireshark: Infinite and large loops in ANSI MAP, ASF, IEEE 802.11, IEEE 802.3, and LTP dissectors (wnpa-sec-2012-08)
832021 - Frame arrival times (pcap) are 1 hour more than timestamps in txt
836960 - CVE-2012-3825 wireshark: Integer overflows in BACapp and Bluetooth HCI dissectors, leading to DoS (wnpa-sec-2012-08)
848541 - CVE-2012-4285 wireshark: crash due to zero division in DCP ETSI dissector (wnpa-sec-2012-13)
848548 - CVE-2012-4288 wireshark: DoS via excessive resource consumption in XTP dissector (wnpa-sec-2012-15)
848561 - CVE-2012-4289 wireshark: DoS via excessive CPU consumption in AFP dissector (wnpa-sec-2012-17)
848572 - CVE-2012-4291 wireshark: DoS via excessive system resource consumption in CIP dissector (wnpa-sec-2012-20)
848575 - CVE-2012-4292 wireshark: crash in STUN dissector (wnpa-sec-2012-21)
848578 - CVE-2012-4290 wireshark: DoS via excessive CPU consumption in CTDB dissector (wnpa-sec-2012-23)
881742 - CVE-2012-5600 CVE-2012-6062 wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)
881748 - CVE-2012-5599 CVE-2012-6061 wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)
881771 - CVE-2012-5598 CVE-2012-6060 wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)
881790 - CVE-2012-5597 CVE-2012-6059 wireshark: DoS (crash) in the ISAKMP dissector (wnpa-sec-2012-35)
881809 - CVE-2012-5595 CVE-2012-6056 wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)
889346 - The NFSv4.1dissectors need to updated to the latest upstream release
965190 - CVE-2013-3559 wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)
965193 - CVE-2013-3557 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)
966331 - CVE-2013-3561 wireshark: Multiple Denial of Service flaws
972686 - CVE-2013-4081 wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)
972688 - CVE-2013-4083 wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)
990166 - CVE-2013-4927 wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)
990170 - CVE-2013-4931 wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)
990172 - CVE-2013-4932 wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)
990175 - CVE-2013-4933 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)
990178 - CVE-2013-4934 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)
990179 - CVE-2013-4935 wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)
990180 - CVE-2013-4936 wireshark: DoS (NULL pointer dereference, crash) in the PROFINET Real-Time dissector (wnpa-sec-2013-53)


References

https://www.redhat.com/security/data/cve/CVE-2012-2392.html
https://www.redhat.com/security/data/cve/CVE-2012-3825.html
https://www.redhat.com/security/data/cve/CVE-2012-4285.html
https://www.redhat.com/security/data/cve/CVE-2012-4288.html
https://www.redhat.com/security/data/cve/CVE-2012-4289.html
https://www.redhat.com/security/data/cve/CVE-2012-4290.html
https://www.redhat.com/security/data/cve/CVE-2012-4291.html
https://www.redhat.com/security/data/cve/CVE-2012-4292.html
https://www.redhat.com/security/data/cve/CVE-2012-5595.html
https://www.redhat.com/security/data/cve/CVE-2012-5597.html
https://www.redhat.com/security/data/cve/CVE-2012-5598.html
https://www.redhat.com/security/data/cve/CVE-2012-5599.html
https://www.redhat.com/security/data/cve/CVE-2012-5600.html
https://www.redhat.com/security/data/cve/CVE-2012-6056.html
https://www.redhat.com/security/data/cve/CVE-2012-6059.html
https://www.redhat.com/security/data/cve/CVE-2012-6060.html
https://www.redhat.com/security/data/cve/CVE-2012-6061.html
https://www.redhat.com/security/data/cve/CVE-2012-6062.html
https://www.redhat.com/security/data/cve/CVE-2013-3557.html
https://www.redhat.com/security/data/cve/CVE-2013-3559.html
https://www.redhat.com/security/data/cve/CVE-2013-3561.html
https://www.redhat.com/security/data/cve/CVE-2013-4081.html
https://www.redhat.com/security/data/cve/CVE-2013-4083.html
https://www.redhat.com/security/data/cve/CVE-2013-4927.html
https://www.redhat.com/security/data/cve/CVE-2013-4931.html
https://www.redhat.com/security/data/cve/CVE-2013-4932.html
https://www.redhat.com/security/data/cve/CVE-2013-4933.html
https://www.redhat.com/security/data/cve/CVE-2013-4934.html
https://www.redhat.com/security/data/cve/CVE-2013-4935.html
https://www.redhat.com/security/data/cve/CVE-2013-4936.html
https://www.redhat.com/security/data/cve/CVE-2013-5721.html
https://access.redhat.com/security/updates/classification/#moderate
http://www.wireshark.org/docs/relnotes/wireshark-1.8.0.html
http://www.wireshark.org/docs/relnotes/wireshark-1.6.0.html
http://www.wireshark.org/docs/relnotes/wireshark-1.4.0.html

Keywords

Rebase


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/