Fedora 31: tcpdump FEDORA-2019-6db0d5b9d9

    Date29 Oct 2019
    CategoryFedora
    313
    Posted ByLinuxSecurity Advisories
    New version 4.9.3, Security fix for CVE-2017-16808, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462, CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467, CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882, CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452,
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-6db0d5b9d9
    2019-10-30 00:57:24.354893
    --------------------------------------------------------------------------------
    
    Name        : tcpdump
    Product     : Fedora 31
    Version     : 4.9.3
    Release     : 1.fc31
    URL         : http://www.tcpdump.org
    Summary     : A network traffic monitoring tool
    Description :
    Tcpdump is a command-line tool for monitoring network traffic.
    Tcpdump can capture and display the packet headers on a particular
    network interface or on all interfaces.  Tcpdump can display all of
    the packet headers, or just the ones that match particular criteria.
    
    Install tcpdump if you need a program to monitor network traffic.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    New version 4.9.3, Security fix for CVE-2017-16808, CVE-2018-14468,
    CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462,
    CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467,
    CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882,
    CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452,
    CVE-2018-16300, CVE-2018-16228, CVE-2019-15166, CVE-2019-15167, CVE-2017-16808,
    CVE-2018-14882, CVE-2018-19519
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Oct 15 2019 Michal Ruprich  - 14:4.9.3-1
    - New version 4.9.3
    - Fixes CVE-2017-16808, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462, CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467, CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882, CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452, CVE-2018-16300, CVE-2018-16228, CVE-2019-15166, CVE-2019-15167
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1760520 - CVE-2019-15166 tcpdump: Buffer overflow in lmp_print_data_link_subobjs() in print-lmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760520
      [ 2 ] Bug #1760518 - CVE-2018-16452 tcpdump: Resource exhaustion in smb_fdata() funtion in smbutil.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760518
      [ 3 ] Bug #1760517 - CVE-2018-16451 tcpdump: Buffer over-read in print_trans() function in print-smb.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760517
      [ 4 ] Bug #1760516 - CVE-2018-16230 tcpdump: Buffer over-read in bgp_attr_print() function in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760516
      [ 5 ] Bug #1760514 - CVE-2018-16228 tcpdump: Buffer over-read in print_prefix() function in print-hncp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760514
      [ 6 ] Bug #1760513 - CVE-2018-14470 tcpdump: Buffer over-read in babel_print_v2() in print-babel.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760513
      [ 7 ] Bug #1760512 - CVE-2018-14467 tcpdump: Buffer over-read in bgp_capabilities_print() in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760512
      [ 8 ] Bug #1760509 - CVE-2018-14466 tcpdump: Buffer over-read in print-icmp6.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760509
      [ 9 ] Bug #1760507 - CVE-2018-14464 tcpdump: Buffer over-read in lmp_print_data_link_subobjs() function in print-lmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760507
      [ 10 ] Bug #1760506 - CVE-2018-14461 tcpdump: Buffer over-read in ldp_tlv_print() function in print-ldp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760506
      [ 11 ] Bug #1760505 - CVE-2018-10105 tcpdump: SMB data printing mishandled (issue 2 of 2)
            https://bugzilla.redhat.com/show_bug.cgi?id=1760505
      [ 12 ] Bug #1760504 - CVE-2018-10103 tcpdump: SMB data printing mishandled (issue 1 of 2)
            https://bugzilla.redhat.com/show_bug.cgi?id=1760504
      [ 13 ] Bug #1760468 - CVE-2018-14880 tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760468
      [ 14 ] Bug #1760464 - CVE-2018-14468 tcpdump: Buffer over-read in mfr_print() function in print-fr.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760464
      [ 15 ] Bug #1760463 - CVE-2018-14881 tcpdump: Buffer over-read in bgp_capabilities_print() function in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760463
      [ 16 ] Bug #1760461 - CVE-2018-16227 tcpdump: Buffer over-read in print-802_11.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760461
      [ 17 ] Bug #1760458 - CVE-2018-16229 tcpdump: Buffer over-read in dccp_print_option() function in print-dccp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760458
      [ 18 ] Bug #1760457 - CVE-2018-14879 tcpdump: Buffer overflow in get_next_file() in tcpdump.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760457
      [ 19 ] Bug #1760455 - CVE-2018-14462 tcpdump: Buffer over-read in icmp_print() function in print-icmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760455
      [ 20 ] Bug #1760453 - CVE-2018-14463 tcpdump: Buffer over-read in vrrp_print() function in print-vrrp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760453
      [ 21 ] Bug #1760449 - CVE-2018-14465 tcpdump: Buffer over-read in rsvp_obj_print() function in print-rsvp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760449
      [ 22 ] Bug #1760447 - CVE-2018-14469 tcpdump: Buffer over-read in ikev1_n_print() function in print-isakmp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760447
      [ 23 ] Bug #1760445 - CVE-2018-16300 tcpdump: Resource exhaustion in bgp_attr_print() function in print-bgp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1760445
      [ 24 ] Bug #1735549 - CVE-2019-1010220 tcpdump: buffer over-read in function print_prefix in print-hncp.c
            https://bugzilla.redhat.com/show_bug.cgi?id=1735549
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-6db0d5b9d9' at the command
    line. For more information, refer to the dnf documentation available at
    http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.