Fedora 30: libpcap FEDORA-2019-eaa681d33e

    Date 26 Oct 2019
    671
    Posted By LinuxSecurity Advisories
    Security fix for CVE-2018-16301, CVE-2019-15161, CVE-2019-15162, CVE-2019-15163, CVE-2019-15164, CVE-2019-15165
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-eaa681d33e
    2019-10-27 01:08:27.202809
    --------------------------------------------------------------------------------
    
    Name        : libpcap
    Product     : Fedora 30
    Version     : 1.9.1
    Release     : 1.fc30
    URL         : https://www.tcpdump.org
    Summary     : A system-independent interface for user-level packet capture
    Description :
    Libpcap provides a portable framework for low-level network
    monitoring.  Libpcap can provide network statistics collection,
    security monitoring and network debugging.  Since almost every system
    vendor provides a different interface for packet capture, the libpcap
    authors created this system-independent API to ease in porting and to
    alleviate the need for several system-dependent packet capture modules
    in each application.
    
    Install libpcap if you need to do low-level network traffic monitoring
    on your network.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Security fix for CVE-2018-16301, CVE-2019-15161, CVE-2019-15162, CVE-2019-15163,
    CVE-2019-15164, CVE-2019-15165
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Fri Oct 11 2019 Michal Ruprich  - 14:1.9.1-1
    - New version 1.9.1
    - Fix for CVE-2018-16301, CVE-2019-15161, CVE-2019-15162, CVE-2019-15163, CVE-2019-15164, CVE-2019-15165
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1760623 - CVE-2019-15161 libpcap: Mishandled length values in reused variables
            https://bugzilla.redhat.com/show_bug.cgi?id=1760623
      [ 2 ] Bug #1760622 - CVE-2019-15162 libpcap: Information disclosure in rpcapd/daemon.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760622
      [ 3 ] Bug #1760621 - CVE-2019-15163 libpcap: Null pointer dereference in rpcapd/daemon.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760621
      [ 4 ] Bug #1760619 - CVE-2019-15164 libpcap: Server side request forgery in rpcapd/daemon.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760619
      [ 5 ] Bug #1760618 - CVE-2019-15165 libpcap: Resource exhaustion while PHB header length validation
            https://bugzilla.redhat.com/show_bug.cgi?id=1760618
      [ 6 ] Bug #1760500 - CVE-2018-16301 libpcap: Buffer overflow in pcapng reader
            https://bugzilla.redhat.com/show_bug.cgi?id=1760500
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-eaa681d33e' at the command
    line. For more information, refer to the dnf documentation available at
    https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"7","type":"x","order":"1","pct":100,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.