{"id":"SUSE-SU-2017:1663-1","summary":"Security update for wireshark","details":"The network debugging tool wireshark was updated to version 2.2.7 to fix the following issues:\n\n- CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)\n- CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)\n- CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)\n- CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)\n- CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)\n- CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)\n- CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)\n- CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)\n- CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)\n- CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)\n- CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)\n- CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)\n","modified":"2026-02-04T03:12:16.720442Z","published":"2017-06-23T13:02:02Z","related":["CVE-2017-9343","CVE-2017-9344","CVE-2017-9345","CVE-2017-9346","CVE-2017-9347","CVE-2017-9348","CVE-2017-9349","CVE-2017-9350","CVE-2017-9351","CVE-2017-9352","CVE-2017-9353","CVE-2017-9354"],"upstream":["CVE-2017-9343","CVE-2017-9344","CVE-2017-9345","CVE-2017-9346","CVE-2017-9347","CVE-2017-9348","CVE-2017-9349","CVE-2017-9350","CVE-2017-9351","CVE-2017-9352","CVE-2017-9353","CVE-2017-9354"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20171663-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042298"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042299"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042302"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042308"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9344"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9346"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9348"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9354"}],"affected":[{"package":{"name":"wireshark","ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-47.1"}]}],"ecosystem_specific":{"binaries":[{"libwsutil7":"2.2.7-47.1","libwiretap6":"2.2.7-47.1","wireshark-gtk":"2.2.7-47.1","libwscodecs1":"2.2.7-47.1","libwireshark8":"2.2.7-47.1","wireshark":"2.2.7-47.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1663-1.json"}},{"package":{"name":"wireshark","ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-47.1"}]}],"ecosystem_specific":{"binaries":[{"libwsutil7":"2.2.7-47.1","libwiretap6":"2.2.7-47.1","wireshark-gtk":"2.2.7-47.1","libwscodecs1":"2.2.7-47.1","libwireshark8":"2.2.7-47.1","wireshark":"2.2.7-47.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1663-1.json"}},{"package":{"name":"wireshark","ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-47.1"}]}],"ecosystem_specific":{"binaries":[{"wireshark-devel":"2.2.7-47.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1663-1.json"}},{"package":{"name":"wireshark","ecosystem":"SUSE:Linux Enterprise Server 12 SP2","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-47.1"}]}],"ecosystem_specific":{"binaries":[{"libwsutil7":"2.2.7-47.1","libwiretap6":"2.2.7-47.1","wireshark-gtk":"2.2.7-47.1","libwscodecs1":"2.2.7-47.1","libwireshark8":"2.2.7-47.1","wireshark":"2.2.7-47.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1663-1.json"}},{"package":{"name":"wireshark","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-47.1"}]}],"ecosystem_specific":{"binaries":[{"libwsutil7":"2.2.7-47.1","libwiretap6":"2.2.7-47.1","wireshark-gtk":"2.2.7-47.1","libwscodecs1":"2.2.7-47.1","libwireshark8":"2.2.7-47.1","wireshark":"2.2.7-47.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1663-1.json"}}],"schema_version":"1.7.3"}