Security Advisory Moderate: wireshark security update

Advisory: RHSA-2014:0342-1
Type: Security Advisory
Severity: Moderate
Issued on: 2014-03-31
Last updated on: 2014-03-31
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.5)
Red Hat Enterprise Linux Server EUS (v. 6.5.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-6336
CVE-2013-6337
CVE-2013-6338
CVE-2013-6339
CVE-2013-6340
CVE-2013-7112
CVE-2013-7114
CVE-2014-2281
CVE-2014-2283
CVE-2014-2299

Details

Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.

Two flaws were found in Wireshark. If Wireshark read a malformed packet off
a network or opened a malicious dump file, it could crash or, possibly,
execute arbitrary code as the user running Wireshark. (CVE-2014-2281,
CVE-2014-2299)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2013-6336, CVE-2013-6337, CVE-2013-6338,
CVE-2013-6339, CVE-2013-6340, CVE-2014-2283, CVE-2013-7112, CVE-2013-7114)

All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
wireshark-1.8.10-7.el6_5.src.rpm
File outdated by:  RHSA-2015:1460
    MD5: d6dbecb7bcfdcfeea49ec0b89ecc70b0
SHA-256: f45ff2cea9fba42eeecd3c38cdcdcae86be7883946a8ca7cc2e8abd22c71f7e4
 
IA-32:
wireshark-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-devel-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-gnome-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 40add835ddd25887ea91f917b3134e36
SHA-256: 11b393b2d4c0320ced5a7ea7c176a89955197106ad3f54f7a2b5943348dccd35
 
x86_64:
wireshark-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 78f7d9fc351af7f9428179f971feca51
SHA-256: 8d8eb84877ff7584b0948810bb0e7e40e77347f5ae331330688dca6b7a57edbf
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-debuginfo-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 606276855ec71bb746a898a8f12dcd9c
SHA-256: 985c87513b9d0e941b368ad6baf05dae25f3adaa18cb4fcef6af45c4676b510d
wireshark-devel-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-devel-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 71fec0278eb4b71d2c1581a30669df54
SHA-256: 40343ef2f6bc5489edcbed56a1f9690c064b7e8f70af21828ea5230ed761f243
wireshark-gnome-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: ccede92b8e135d0d883ada5f91f9f4ec
SHA-256: ace29578c896ca2120402f9972219605e865d4a2361e0cd8e0acd93879b36fe9
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
wireshark-1.8.10-7.el6_5.src.rpm
File outdated by:  RHSA-2015:1460
    MD5: d6dbecb7bcfdcfeea49ec0b89ecc70b0
SHA-256: f45ff2cea9fba42eeecd3c38cdcdcae86be7883946a8ca7cc2e8abd22c71f7e4
 
IA-32:
wireshark-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-devel-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-gnome-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 40add835ddd25887ea91f917b3134e36
SHA-256: 11b393b2d4c0320ced5a7ea7c176a89955197106ad3f54f7a2b5943348dccd35
 
PPC:
wireshark-1.8.10-7.el6_5.ppc.rpm
File outdated by:  RHSA-2015:1460
    MD5: aaf9102e90d70ec4ed850b1e5e700120
SHA-256: 12904804cb6df85c8063416d743bbb490075dfbf8c1f9b4286cd800c6f30869d
wireshark-1.8.10-7.el6_5.ppc64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 2a244432c416029dd00c217e9dd11755
SHA-256: 2d2cdade9aa9b598f785ccbf20b4e4f5d97ee7fc782199dbc0a11d381e13aaa9
wireshark-debuginfo-1.8.10-7.el6_5.ppc.rpm
File outdated by:  RHSA-2015:1460
    MD5: cca4861d7eb060d46f7e15815b7dded8
SHA-256: 6e148f951f0c558e4a60100653a919c7df6d492e8cd5464370dc51662a12e3cc
wireshark-debuginfo-1.8.10-7.el6_5.ppc64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0a774e3094fdb1a1872651fa500b7b77
SHA-256: ee8ba6c382f51de5ab1ca2ea9820b82bde1e153025c2eb79cd26fe1aac8be868
wireshark-devel-1.8.10-7.el6_5.ppc.rpm
File outdated by:  RHSA-2015:1460
    MD5: b1cc103f7e30336ffc7299473d6cd172
SHA-256: f2e7504f68d488ff4c5c0ded895275f291cc92bcf6fe77044552a6182cd7809f
wireshark-devel-1.8.10-7.el6_5.ppc64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 724b740585a66d308c879798f5d5f703
SHA-256: 02e2e5697dc7532d2e72c877634eec759c3ab1d39737b24c43269571b845a37e
wireshark-gnome-1.8.10-7.el6_5.ppc64.rpm
File outdated by:  RHSA-2015:1460
    MD5: b6ff31193f47343c8ac90d9519a0acec
SHA-256: 4e36dd9067374cf096bf9eedc4aefe0e8d2012729bfe5b2b50f691f86079517c
 
s390x:
wireshark-1.8.10-7.el6_5.s390.rpm
File outdated by:  RHSA-2015:1460
    MD5: 9fbfed168403602d1f4e7b6f2df1938a
SHA-256: 8299a4c0602e68cced41e9b03189595abad1ead0edecdb2e343ecc1cd6d6249c
wireshark-1.8.10-7.el6_5.s390x.rpm
File outdated by:  RHSA-2015:1460
    MD5: c182d971dac073ada1695e1cf8c2c573
SHA-256: bd273b3a02e71d02eca85a99ddaa079f34f489ac0fe2c986ff441a426be8f4aa
wireshark-debuginfo-1.8.10-7.el6_5.s390.rpm
File outdated by:  RHSA-2015:1460
    MD5: 4037517f410989893b923cdd64ecebbf
SHA-256: f39a8bb1ed1f4e429bbf249a77f0217a34d4112762e03b537775134353119e8e
wireshark-debuginfo-1.8.10-7.el6_5.s390x.rpm
File outdated by:  RHSA-2015:1460
    MD5: 7b9a6e38a70424c24c06ef3814eeeea8
SHA-256: 768dd28f95af65ee81dd3e256675d53387e7b6588922fa8ab612fbe45dc270c6
wireshark-devel-1.8.10-7.el6_5.s390.rpm
File outdated by:  RHSA-2015:1460
    MD5: 8526a19c81e3f111ddc109f4527a5dc4
SHA-256: cb90fca9b0708377c9fc083ae206a9ffc3207cdd509fe1f44643d761f792a765
wireshark-devel-1.8.10-7.el6_5.s390x.rpm
File outdated by:  RHSA-2015:1460
    MD5: 94514952f2ded4860fb312cacd11281c
SHA-256: 85adfec82d83b5fab1657dc49c6a4581a7cccb306196e42f0733f077b861d0d0
wireshark-gnome-1.8.10-7.el6_5.s390x.rpm
File outdated by:  RHSA-2015:1460
    MD5: 091301c2a188b3bd3562448b3178db30
SHA-256: 831cebf4d4cc5ca3db783c73fefd83e8e9c1dc548d2fe2d9da365322b7892a3d
 
x86_64:
wireshark-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 78f7d9fc351af7f9428179f971feca51
SHA-256: 8d8eb84877ff7584b0948810bb0e7e40e77347f5ae331330688dca6b7a57edbf
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-debuginfo-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 606276855ec71bb746a898a8f12dcd9c
SHA-256: 985c87513b9d0e941b368ad6baf05dae25f3adaa18cb4fcef6af45c4676b510d
wireshark-devel-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-devel-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 71fec0278eb4b71d2c1581a30669df54
SHA-256: 40343ef2f6bc5489edcbed56a1f9690c064b7e8f70af21828ea5230ed761f243
wireshark-gnome-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: ccede92b8e135d0d883ada5f91f9f4ec
SHA-256: ace29578c896ca2120402f9972219605e865d4a2361e0cd8e0acd93879b36fe9
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
wireshark-1.8.10-7.el6_5.src.rpm
File outdated by:  RHSA-2015:1460
    MD5: d6dbecb7bcfdcfeea49ec0b89ecc70b0
SHA-256: f45ff2cea9fba42eeecd3c38cdcdcae86be7883946a8ca7cc2e8abd22c71f7e4
 
x86_64:
wireshark-1.8.10-7.el6_5.i686.rpm     MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-1.8.10-7.el6_5.x86_64.rpm     MD5: 78f7d9fc351af7f9428179f971feca51
SHA-256: 8d8eb84877ff7584b0948810bb0e7e40e77347f5ae331330688dca6b7a57edbf
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm     MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-debuginfo-1.8.10-7.el6_5.x86_64.rpm     MD5: 606276855ec71bb746a898a8f12dcd9c
SHA-256: 985c87513b9d0e941b368ad6baf05dae25f3adaa18cb4fcef6af45c4676b510d
wireshark-devel-1.8.10-7.el6_5.i686.rpm     MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-devel-1.8.10-7.el6_5.x86_64.rpm     MD5: 71fec0278eb4b71d2c1581a30669df54
SHA-256: 40343ef2f6bc5489edcbed56a1f9690c064b7e8f70af21828ea5230ed761f243
wireshark-gnome-1.8.10-7.el6_5.x86_64.rpm     MD5: ccede92b8e135d0d883ada5f91f9f4ec
SHA-256: ace29578c896ca2120402f9972219605e865d4a2361e0cd8e0acd93879b36fe9
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
wireshark-1.8.10-7.el6_5.src.rpm
File outdated by:  RHSA-2015:1460
    MD5: d6dbecb7bcfdcfeea49ec0b89ecc70b0
SHA-256: f45ff2cea9fba42eeecd3c38cdcdcae86be7883946a8ca7cc2e8abd22c71f7e4
 
IA-32:
wireshark-1.8.10-7.el6_5.i686.rpm     MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm     MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-devel-1.8.10-7.el6_5.i686.rpm     MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-gnome-1.8.10-7.el6_5.i686.rpm     MD5: 40add835ddd25887ea91f917b3134e36
SHA-256: 11b393b2d4c0320ced5a7ea7c176a89955197106ad3f54f7a2b5943348dccd35
 
PPC:
wireshark-1.8.10-7.el6_5.ppc.rpm     MD5: aaf9102e90d70ec4ed850b1e5e700120
SHA-256: 12904804cb6df85c8063416d743bbb490075dfbf8c1f9b4286cd800c6f30869d
wireshark-1.8.10-7.el6_5.ppc64.rpm     MD5: 2a244432c416029dd00c217e9dd11755
SHA-256: 2d2cdade9aa9b598f785ccbf20b4e4f5d97ee7fc782199dbc0a11d381e13aaa9
wireshark-debuginfo-1.8.10-7.el6_5.ppc.rpm     MD5: cca4861d7eb060d46f7e15815b7dded8
SHA-256: 6e148f951f0c558e4a60100653a919c7df6d492e8cd5464370dc51662a12e3cc
wireshark-debuginfo-1.8.10-7.el6_5.ppc64.rpm     MD5: 0a774e3094fdb1a1872651fa500b7b77
SHA-256: ee8ba6c382f51de5ab1ca2ea9820b82bde1e153025c2eb79cd26fe1aac8be868
wireshark-devel-1.8.10-7.el6_5.ppc.rpm     MD5: b1cc103f7e30336ffc7299473d6cd172
SHA-256: f2e7504f68d488ff4c5c0ded895275f291cc92bcf6fe77044552a6182cd7809f
wireshark-devel-1.8.10-7.el6_5.ppc64.rpm     MD5: 724b740585a66d308c879798f5d5f703
SHA-256: 02e2e5697dc7532d2e72c877634eec759c3ab1d39737b24c43269571b845a37e
wireshark-gnome-1.8.10-7.el6_5.ppc64.rpm     MD5: b6ff31193f47343c8ac90d9519a0acec
SHA-256: 4e36dd9067374cf096bf9eedc4aefe0e8d2012729bfe5b2b50f691f86079517c
 
s390x:
wireshark-1.8.10-7.el6_5.s390.rpm     MD5: 9fbfed168403602d1f4e7b6f2df1938a
SHA-256: 8299a4c0602e68cced41e9b03189595abad1ead0edecdb2e343ecc1cd6d6249c
wireshark-1.8.10-7.el6_5.s390x.rpm     MD5: c182d971dac073ada1695e1cf8c2c573
SHA-256: bd273b3a02e71d02eca85a99ddaa079f34f489ac0fe2c986ff441a426be8f4aa
wireshark-debuginfo-1.8.10-7.el6_5.s390.rpm     MD5: 4037517f410989893b923cdd64ecebbf
SHA-256: f39a8bb1ed1f4e429bbf249a77f0217a34d4112762e03b537775134353119e8e
wireshark-debuginfo-1.8.10-7.el6_5.s390x.rpm     MD5: 7b9a6e38a70424c24c06ef3814eeeea8
SHA-256: 768dd28f95af65ee81dd3e256675d53387e7b6588922fa8ab612fbe45dc270c6
wireshark-devel-1.8.10-7.el6_5.s390.rpm     MD5: 8526a19c81e3f111ddc109f4527a5dc4
SHA-256: cb90fca9b0708377c9fc083ae206a9ffc3207cdd509fe1f44643d761f792a765
wireshark-devel-1.8.10-7.el6_5.s390x.rpm     MD5: 94514952f2ded4860fb312cacd11281c
SHA-256: 85adfec82d83b5fab1657dc49c6a4581a7cccb306196e42f0733f077b861d0d0
wireshark-gnome-1.8.10-7.el6_5.s390x.rpm     MD5: 091301c2a188b3bd3562448b3178db30
SHA-256: 831cebf4d4cc5ca3db783c73fefd83e8e9c1dc548d2fe2d9da365322b7892a3d
 
x86_64:
wireshark-1.8.10-7.el6_5.i686.rpm     MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-1.8.10-7.el6_5.x86_64.rpm     MD5: 78f7d9fc351af7f9428179f971feca51
SHA-256: 8d8eb84877ff7584b0948810bb0e7e40e77347f5ae331330688dca6b7a57edbf
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm     MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-debuginfo-1.8.10-7.el6_5.x86_64.rpm     MD5: 606276855ec71bb746a898a8f12dcd9c
SHA-256: 985c87513b9d0e941b368ad6baf05dae25f3adaa18cb4fcef6af45c4676b510d
wireshark-devel-1.8.10-7.el6_5.i686.rpm     MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-devel-1.8.10-7.el6_5.x86_64.rpm     MD5: 71fec0278eb4b71d2c1581a30669df54
SHA-256: 40343ef2f6bc5489edcbed56a1f9690c064b7e8f70af21828ea5230ed761f243
wireshark-gnome-1.8.10-7.el6_5.x86_64.rpm     MD5: ccede92b8e135d0d883ada5f91f9f4ec
SHA-256: ace29578c896ca2120402f9972219605e865d4a2361e0cd8e0acd93879b36fe9
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
wireshark-1.8.10-7.el6_5.src.rpm
File outdated by:  RHSA-2015:1460
    MD5: d6dbecb7bcfdcfeea49ec0b89ecc70b0
SHA-256: f45ff2cea9fba42eeecd3c38cdcdcae86be7883946a8ca7cc2e8abd22c71f7e4
 
IA-32:
wireshark-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-devel-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-gnome-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 40add835ddd25887ea91f917b3134e36
SHA-256: 11b393b2d4c0320ced5a7ea7c176a89955197106ad3f54f7a2b5943348dccd35
 
x86_64:
wireshark-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: f03c40ec9bc4c19b765b23730e53418c
SHA-256: 95ae092fbb152cdfa1c7fa3d241a31422267e748da691058a121ec5f3ad14a74
wireshark-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 78f7d9fc351af7f9428179f971feca51
SHA-256: 8d8eb84877ff7584b0948810bb0e7e40e77347f5ae331330688dca6b7a57edbf
wireshark-debuginfo-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 6a4ee6b04a5150d7c2bb8210db64936a
SHA-256: 08202d5447936e48ea7b11af671de605b06867f1b915e46aea0a9eabb6644107
wireshark-debuginfo-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 606276855ec71bb746a898a8f12dcd9c
SHA-256: 985c87513b9d0e941b368ad6baf05dae25f3adaa18cb4fcef6af45c4676b510d
wireshark-devel-1.8.10-7.el6_5.i686.rpm
File outdated by:  RHSA-2015:1460
    MD5: 0b0af09462378a29562e66cd4f44e09c
SHA-256: e6b9cd3c7014708518afa419ea6e910b12488fcfe30c8745557338151d8819bd
wireshark-devel-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: 71fec0278eb4b71d2c1581a30669df54
SHA-256: 40343ef2f6bc5489edcbed56a1f9690c064b7e8f70af21828ea5230ed761f243
wireshark-gnome-1.8.10-7.el6_5.x86_64.rpm
File outdated by:  RHSA-2015:1460
    MD5: ccede92b8e135d0d883ada5f91f9f4ec
SHA-256: ace29578c896ca2120402f9972219605e865d4a2361e0cd8e0acd93879b36fe9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1026534 - CVE-2013-6336 wireshark: IEEE 802.15.4 dissector crash (wnpa-sec-2013-61)
1026538 - CVE-2013-6337 wireshark: NBAP dissector crash (wnpa-sec-2013-62)
1026539 - CVE-2013-6338 wireshark: SIP dissector crash (wnpa-sec-2013-63)
1026540 - CVE-2013-6339 wireshark: ActiveMQ OpenWire dissector large loop (wnpa-sec-2013-64)
1026541 - CVE-2013-6340 wireshark: TCP dissector crash (wnpa-sec-2013-65)
1044508 - CVE-2013-7112 wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)
1044510 - CVE-2013-7114 wireshark: NTLMSSP v2 dissector could crash (wnpa-sec-2013-68)
1074109 - CVE-2014-2299 wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
1074111 - CVE-2014-2283 wireshark: RLC dissector crash (wnpa-sec-2014-03)
1074114 - CVE-2014-2281 wireshark: NFS dissector crash (wnpa-sec-2014-01)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/