openSUSE: 2019:2348-1: important: tcpdump

    Date20 Oct 2019
    CategoryopenSUSE
    373
    Posted ByLinuxSecurity Advisories
    Opensuse Large
    An update that fixes 28 vulnerabilities is now available.
       openSUSE Security Update: Security update for tcpdump
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2019:2348-1
    Rating:             important
    References:         #1068716 #1153098 #1153332 
    Cross-References:   CVE-2017-16808 CVE-2018-10103 CVE-2018-10105
                        CVE-2018-14461 CVE-2018-14462 CVE-2018-14463
                        CVE-2018-14464 CVE-2018-14465 CVE-2018-14466
                        CVE-2018-14467 CVE-2018-14468 CVE-2018-14469
                        CVE-2018-14470 CVE-2018-14879 CVE-2018-14880
                        CVE-2018-14881 CVE-2018-14882 CVE-2018-16227
                        CVE-2018-16228 CVE-2018-16229 CVE-2018-16230
                        CVE-2018-16300 CVE-2018-16301 CVE-2018-16451
                        CVE-2018-16452 CVE-2019-1010220 CVE-2019-15166
                        CVE-2019-15167
    Affected Products:
                        openSUSE Leap 15.1
    ______________________________________________________________________________
    
       An update that fixes 28 vulnerabilities is now available.
    
    Description:
    
       This update for tcpdump fixes the following issues:
    
       - CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print
         and lookup_emem (bsc#1068716 bsc#1153098).
       - CVE-2018-10103: Fixed a mishandling of the printing of SMB data
         (bsc#1153098).
       - CVE-2018-10105: Fixed a mishandling of the printing of SMB data
         (bsc#1153098).
       - CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print
         (bsc#1153098).
       - CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print
         (bsc#1153098).
       - CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print
         (bsc#1153098).
       - CVE-2018-14464: Fixed a buffer over-read in
         print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
       - CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print
         (bsc#1153098).
       - CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find
         (bsc#1153098).
       - CVE-2018-14467: Fixed a buffer over-read in
         print-bgp.c:bgp_capabilities_print (bsc#1153098).
       - CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print
         (bsc#1153098).
       - CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print
         (bsc#1153098).
       - CVE-2018-14470: Fixed a buffer over-read in print-babel.c:babel_print_v2
         (bsc#1153098).
       - CVE-2018-14879: Fixed a buffer overflow in the command-line argument
         parser (bsc#1153098).
       - CVE-2018-14880: Fixed a buffer over-read in the OSPFv3 parser
         (bsc#1153098).
       - CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
       - CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser
         (bsc#1153098).
       - CVE-2018-16227: Fixed a buffer over-read in the IEEE 802.11 parser in
         print-802_11.c for the Mesh Flags subfield (bsc#1153098).
       - CVE-2018-16228: Fixed a buffer over-read in the HNCP parser
         (bsc#1153098).
       - CVE-2018-16229: Fixed a buffer over-read in the DCCP parser
         (bsc#1153098).
       - CVE-2018-16230: Fixed a buffer over-read in the BGP parser in
         print-bgp.c:bgp_attr_print (bsc#1153098).
       - CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that
         allowed denial-of-service by stack consumption (bsc#1153098).
       - CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
       - CVE-2018-16451: Fixed several buffer over-reads in
         print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN
         (bsc#1153098).
       - CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata
         (bsc#1153098).
       - CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs
         (bsc#1153098).
       - CVE-2019-15167: Fixed a vulnerability in VRRP (bsc#1153098).
    
       This update was imported from the SUSE:SLE-15:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.1:
    
          zypper in -t patch openSUSE-2019-2348=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.1 (x86_64):
    
          tcpdump-4.9.2-lp151.4.6.1
          tcpdump-debuginfo-4.9.2-lp151.4.6.1
          tcpdump-debugsource-4.9.2-lp151.4.6.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2017-16808.html
       https://www.suse.com/security/cve/CVE-2018-10103.html
       https://www.suse.com/security/cve/CVE-2018-10105.html
       https://www.suse.com/security/cve/CVE-2018-14461.html
       https://www.suse.com/security/cve/CVE-2018-14462.html
       https://www.suse.com/security/cve/CVE-2018-14463.html
       https://www.suse.com/security/cve/CVE-2018-14464.html
       https://www.suse.com/security/cve/CVE-2018-14465.html
       https://www.suse.com/security/cve/CVE-2018-14466.html
       https://www.suse.com/security/cve/CVE-2018-14467.html
       https://www.suse.com/security/cve/CVE-2018-14468.html
       https://www.suse.com/security/cve/CVE-2018-14469.html
       https://www.suse.com/security/cve/CVE-2018-14470.html
       https://www.suse.com/security/cve/CVE-2018-14879.html
       https://www.suse.com/security/cve/CVE-2018-14880.html
       https://www.suse.com/security/cve/CVE-2018-14881.html
       https://www.suse.com/security/cve/CVE-2018-14882.html
       https://www.suse.com/security/cve/CVE-2018-16227.html
       https://www.suse.com/security/cve/CVE-2018-16228.html
       https://www.suse.com/security/cve/CVE-2018-16229.html
       https://www.suse.com/security/cve/CVE-2018-16230.html
       https://www.suse.com/security/cve/CVE-2018-16300.html
       https://www.suse.com/security/cve/CVE-2018-16301.html
       https://www.suse.com/security/cve/CVE-2018-16451.html
       https://www.suse.com/security/cve/CVE-2018-16452.html
       https://www.suse.com/security/cve/CVE-2019-1010220.html
       https://www.suse.com/security/cve/CVE-2019-15166.html
       https://www.suse.com/security/cve/CVE-2019-15167.html
       https://bugzilla.suse.com/1068716
       https://bugzilla.suse.com/1153098
       https://bugzilla.suse.com/1153332
    
    -- 
    

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50.65,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"27","type":"x","order":"3","pct":35.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.