Fedora 29: tcpdump FEDORA-2019-85d92df70f

    Date 25 Oct 2019
    431
    Posted By LinuxSecurity Advisories
    New version 4.9.3, Security fix for CVE-2017-16808, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462, CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467, CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882, CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452,
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-85d92df70f
    2019-10-25 18:06:00.866633
    --------------------------------------------------------------------------------
    
    Name        : tcpdump
    Product     : Fedora 29
    Version     : 4.9.3
    Release     : 1.fc29
    URL         : https://www.tcpdump.org
    Summary     : A network traffic monitoring tool
    Description :
    Tcpdump is a command-line tool for monitoring network traffic.
    Tcpdump can capture and display the packet headers on a particular
    network interface or on all interfaces.  Tcpdump can display all of
    the packet headers, or just the ones that match particular criteria.
    
    Install tcpdump if you need a program to monitor network traffic.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    New version 4.9.3, Security fix for CVE-2017-16808, CVE-2018-14468,
    CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462,
    CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467,
    CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882,
    CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452,
    CVE-2018-16300, CVE-2018-16228, CVE-2019-15166, CVE-2019-15167, CVE-2017-16808,
    CVE-2018-14882, CVE-2018-19519
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Mon Oct 14 2019 Michal Ruprich  - 14:4.9.3-1
    - New version 4.9.3
    - Fixes CVE-2017-16808, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462, CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467, CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882, CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452, CVE-2018-16300, CVE-2018-16228, CVE-2019-15166, CVE-2019-15167
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1760520 - CVE-2019-15166 tcpdump: Buffer overflow in lmp_print_data_link_subobjs() in print-lmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760520
      [ 2 ] Bug #1760518 - CVE-2018-16452 tcpdump: Resource exhaustion in smb_fdata() funtion in smbutil.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760518
      [ 3 ] Bug #1760517 - CVE-2018-16451 tcpdump: Buffer over-read in print_trans() function in print-smb.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760517
      [ 4 ] Bug #1760516 - CVE-2018-16230 tcpdump: Buffer over-read in bgp_attr_print() function in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760516
      [ 5 ] Bug #1760514 - CVE-2018-16228 tcpdump: Buffer over-read in print_prefix() function in print-hncp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760514
      [ 6 ] Bug #1760513 - CVE-2018-14470 tcpdump: Buffer over-read in babel_print_v2() in print-babel.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760513
      [ 7 ] Bug #1760512 - CVE-2018-14467 tcpdump: Buffer over-read in bgp_capabilities_print() in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760512
      [ 8 ] Bug #1760509 - CVE-2018-14466 tcpdump: Buffer over-read in print-icmp6.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760509
      [ 9 ] Bug #1760507 - CVE-2018-14464 tcpdump: Buffer over-read in lmp_print_data_link_subobjs() function in print-lmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760507
      [ 10 ] Bug #1760506 - CVE-2018-14461 tcpdump: Buffer over-read in ldp_tlv_print() function in print-ldp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760506
      [ 11 ] Bug #1760505 - CVE-2018-10105 tcpdump: SMB data printing mishandled (issue 2 of 2)
            https://bugzilla.redhat.com/show_bug.cgi?id=1760505
      [ 12 ] Bug #1760504 - CVE-2018-10103 tcpdump: SMB data printing mishandled (issue 1 of 2)
            https://bugzilla.redhat.com/show_bug.cgi?id=1760504
      [ 13 ] Bug #1760468 - CVE-2018-14880 tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760468
      [ 14 ] Bug #1760464 - CVE-2018-14468 tcpdump: Buffer over-read in mfr_print() function in print-fr.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760464
      [ 15 ] Bug #1760463 - CVE-2018-14881 tcpdump: Buffer over-read in bgp_capabilities_print() function in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760463
      [ 16 ] Bug #1760461 - CVE-2018-16227 tcpdump: Buffer over-read in print-802_11.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760461
      [ 17 ] Bug #1760458 - CVE-2018-16229 tcpdump: Buffer over-read in dccp_print_option() function in print-dccp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760458
      [ 18 ] Bug #1760457 - CVE-2018-14879 tcpdump: Buffer overflow in get_next_file() in tcpdump.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760457
      [ 19 ] Bug #1760455 - CVE-2018-14462 tcpdump: Buffer over-read in icmp_print() function in print-icmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760455
      [ 20 ] Bug #1760453 - CVE-2018-14463 tcpdump: Buffer over-read in vrrp_print() function in print-vrrp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760453
      [ 21 ] Bug #1760449 - CVE-2018-14465 tcpdump: Buffer over-read in rsvp_obj_print() function in print-rsvp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760449
      [ 22 ] Bug #1760447 - CVE-2018-14469 tcpdump: Buffer over-read in ikev1_n_print() function in print-isakmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760447
      [ 23 ] Bug #1760445 - CVE-2018-16300 tcpdump: Resource exhaustion in bgp_attr_print() function in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760445
      [ 24 ] Bug #1735549 - CVE-2019-1010220 tcpdump: buffer over-read in function print_prefix in print-hncp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1735549
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-85d92df70f' at the command
    line. For more information, refer to the dnf documentation available at
    https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"7","type":"x","order":"1","pct":100,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.