SUSE Security Update: Security update for tcpdump
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3360-1
Rating:             moderate
References:         #1153098 #1153332 #1178466 
Cross-References:   CVE-2017-16808 CVE-2018-10103 CVE-2018-10105
                    CVE-2018-14461 CVE-2018-14462 CVE-2018-14463
                    CVE-2018-14464 CVE-2018-14465 CVE-2018-14466
                    CVE-2018-14467 CVE-2018-14468 CVE-2018-14469
                    CVE-2018-14470 CVE-2018-14879 CVE-2018-14880
                    CVE-2018-14881 CVE-2018-14882 CVE-2018-16227
                    CVE-2018-16228 CVE-2018-16229 CVE-2018-16230
                    CVE-2018-16300 CVE-2018-16301 CVE-2018-16451
                    CVE-2018-16452 CVE-2019-1010220 CVE-2019-15166
                    CVE-2019-15167 CVE-2020-8037
Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that fixes 29 vulnerabilities is now available.

Description:

   This update for tcpdump fixes the following issues:

   - CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate
     the right buffer size (bsc#1178466).

   The previous update of tcpdump already fixed variuous Buffer
   overflow/overread vulnerabilities [bsc#1153098, bsc#1153332]

   - CVE-2017-16808 (AoE)
   - CVE-2018-14468 (FrameRelay)
   - CVE-2018-14469 (IKEv1)
   - CVE-2018-14470 (BABEL)
   - CVE-2018-14466 (AFS/RX)
   - CVE-2018-14461 (LDP)
   - CVE-2018-14462 (ICMP)
   - CVE-2018-14465 (RSVP)
   - CVE-2018-14464 (LMP)
   - CVE-2019-15166 (LMP)
   - CVE-2018-14880 (OSPF6)
   - CVE-2018-14882 (RPL)
   - CVE-2018-16227 (802.11)
   - CVE-2018-16229 (DCCP)
   - CVE-2018-14467 (BGP)
   - CVE-2018-14881 (BGP)
   - CVE-2018-16230 (BGP)
   - CVE-2018-16300 (BGP)
   - CVE-2018-14463 (VRRP)
   - CVE-2019-15167 (VRRP)
   - CVE-2018-14879 (tcpdump -V)
   - CVE-2018-16228 (HNCP) is a duplicate of the already fixed
     CVE-2019-1010220
   - CVE-2018-16301 (fixed in libpcap)
   - CVE-2018-16451 (SMB)
   - CVE-2018-16452 (SMB)
   - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled)
   - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1



Package List:

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      tcpdump-4.9.2-14.17.1
      tcpdump-debuginfo-4.9.2-14.17.1
      tcpdump-debugsource-4.9.2-14.17.1


References:

   https://www.suse.com/security/cve/CVE-2017-16808.html
   https://www.suse.com/security/cve/CVE-2018-10103.html
   https://www.suse.com/security/cve/CVE-2018-10105.html
   https://www.suse.com/security/cve/CVE-2018-14461.html
   https://www.suse.com/security/cve/CVE-2018-14462.html
   https://www.suse.com/security/cve/CVE-2018-14463.html
   https://www.suse.com/security/cve/CVE-2018-14464.html
   https://www.suse.com/security/cve/CVE-2018-14465.html
   https://www.suse.com/security/cve/CVE-2018-14466.html
   https://www.suse.com/security/cve/CVE-2018-14467.html
   https://www.suse.com/security/cve/CVE-2018-14468.html
   https://www.suse.com/security/cve/CVE-2018-14469.html
   https://www.suse.com/security/cve/CVE-2018-14470.html
   https://www.suse.com/security/cve/CVE-2018-14879.html
   https://www.suse.com/security/cve/CVE-2018-14880.html
   https://www.suse.com/security/cve/CVE-2018-14881.html
   https://www.suse.com/security/cve/CVE-2018-14882.html
   https://www.suse.com/security/cve/CVE-2018-16227.html
   https://www.suse.com/security/cve/CVE-2018-16228.html
   https://www.suse.com/security/cve/CVE-2018-16229.html
   https://www.suse.com/security/cve/CVE-2018-16230.html
   https://www.suse.com/security/cve/CVE-2018-16300.html
   https://www.suse.com/security/cve/CVE-2018-16301.html
   https://www.suse.com/security/cve/CVE-2018-16451.html
   https://www.suse.com/security/cve/CVE-2018-16452.html
   https://www.suse.com/security/cve/CVE-2019-1010220.html
   https://www.suse.com/security/cve/CVE-2019-15166.html
   https://www.suse.com/security/cve/CVE-2019-15167.html
   https://www.suse.com/security/cve/CVE-2020-8037.html
   https://bugzilla.suse.com/1153098
   https://bugzilla.suse.com/1153332
   https://bugzilla.suse.com/1178466

SUSE: 2020:3360-1 moderate: tcpdump

November 17, 2020
An update that fixes 29 vulnerabilities is now available

Summary

This update for tcpdump fixes the following issues: - CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466). The previous update of tcpdump already fixed variuous Buffer overflow/overread vulnerabilities [bsc#1153098, bsc#1153332] - CVE-2017-16808 (AoE) - CVE-2018-14468 (FrameRelay) - CVE-2018-14469 (IKEv1) - CVE-2018-14470 (BABEL) - CVE-2018-14466 (AFS/RX) - CVE-2018-14461 (LDP) - CVE-2018-14462 (ICMP) - CVE-2018-14465 (RSVP) - CVE-2018-14464 (LMP) - CVE-2019-15166 (LMP) - CVE-2018-14880 (OSPF6) - CVE-2018-14882 (RPL) - CVE-2018-16227 (802.11) - CVE-2018-16229 (DCCP) - CVE-2018-14467 (BGP) - CVE-2018-14881 (BGP) - CVE-2018-16230 (BGP) - CVE-2018-16300 (BGP) - CVE-2018-14463 (VRRP) - CVE-2019-15167 (VRRP) - CVE-2018-14879 (tcpdump -V) - CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220 - CVE-2018-16301 (fixed in libpcap) - CVE-2018-16451 (SMB) - CVE-2018-16452 (SMB) - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1 Package List: - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): tcpdump-4.9.2-14.17.1 tcpdump-debuginfo-4.9.2-14.17.1 tcpdump-debugsource-4.9.2-14.17.1

References

#1153098 #1153332 #1178466

Cross- CVE-2017-16808 CVE-2018-10103 CVE-2018-10105

CVE-2018-14461 CVE-2018-14462 CVE-2018-14463

CVE-2018-14464 CVE-2018-14465 CVE-2018-14466

CVE-2018-14467 CVE-2018-14468 CVE-2018-14469

CVE-2018-14470 CVE-2018-14879 CVE-2018-14880

CVE-2018-14881 CVE-2018-14882 CVE-2018-16227

CVE-2018-16228 CVE-2018-16229 CVE-2018-16230

CVE-2018-16300 CVE-2018-16301 CVE-2018-16451

CVE-2018-16452 CVE-2019-1010220 CVE-2019-15166

CVE-2019-15167 CVE-2020-8037

Affected Products:

SUSE Linux Enterprise Server 12-SP5

https://www.suse.com/security/cve/CVE-2017-16808.html

https://www.suse.com/security/cve/CVE-2018-10103.html

https://www.suse.com/security/cve/CVE-2018-10105.html

https://www.suse.com/security/cve/CVE-2018-14461.html

https://www.suse.com/security/cve/CVE-2018-14462.html

https://www.suse.com/security/cve/CVE-2018-14463.html

https://www.suse.com/security/cve/CVE-2018-14464.html

https://www.suse.com/security/cve/CVE-2018-14465.html

https://www.suse.com/security/cve/CVE-2018-14466.html

https://www.suse.com/security/cve/CVE-2018-14467.html

https://www.suse.com/security/cve/CVE-2018-14468.html

https://www.suse.com/security/cve/CVE-2018-14469.html

https://www.suse.com/security/cve/CVE-2018-14470.html

https://www.suse.com/security/cve/CVE-2018-14879.html

https://www.suse.com/security/cve/CVE-2018-14880.html

https://www.suse.com/security/cve/CVE-2018-14881.html

https://www.suse.com/security/cve/CVE-2018-14882.html

https://www.suse.com/security/cve/CVE-2018-16227.html

https://www.suse.com/security/cve/CVE-2018-16228.html

https://www.suse.com/security/cve/CVE-2018-16229.html

https://www.suse.com/security/cve/CVE-2018-16230.html

https://www.suse.com/security/cve/CVE-2018-16300.html

https://www.suse.com/security/cve/CVE-2018-16301.html

https://www.suse.com/security/cve/CVE-2018-16451.html

https://www.suse.com/security/cve/CVE-2018-16452.html

https://www.suse.com/security/cve/CVE-2019-1010220.html

https://www.suse.com/security/cve/CVE-2019-15166.html

https://www.suse.com/security/cve/CVE-2019-15167.html

https://www.suse.com/security/cve/CVE-2020-8037.html

https://bugzilla.suse.com/1153098

https://bugzilla.suse.com/1153332

https://bugzilla.suse.com/1178466

Severity
Announcement ID: SUSE-SU-2020:3360-1
Rating: moderate

Related News