SUSE Security Update: Security update for tcpdump
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3360-1
Rating:             moderate
References:         #1153098 #1153332 #1178466 
Cross-References:   CVE-2017-16808 CVE-2018-10103 CVE-2018-10105
                    CVE-2018-14461 CVE-2018-14462 CVE-2018-14463
                    CVE-2018-14464 CVE-2018-14465 CVE-2018-14466
                    CVE-2018-14467 CVE-2018-14468 CVE-2018-14469
                    CVE-2018-14470 CVE-2018-14879 CVE-2018-14880
                    CVE-2018-14881 CVE-2018-14882 CVE-2018-16227
                    CVE-2018-16228 CVE-2018-16229 CVE-2018-16230
                    CVE-2018-16300 CVE-2018-16301 CVE-2018-16451
                    CVE-2018-16452 CVE-2019-1010220 CVE-2019-15166
                    CVE-2019-15167 CVE-2020-8037
Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that fixes 29 vulnerabilities is now available.

Description:

   This update for tcpdump fixes the following issues:

   - CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate
     the right buffer size (bsc#1178466).

   The previous update of tcpdump already fixed variuous Buffer
   overflow/overread vulnerabilities [bsc#1153098, bsc#1153332]

   - CVE-2017-16808 (AoE)
   - CVE-2018-14468 (FrameRelay)
   - CVE-2018-14469 (IKEv1)
   - CVE-2018-14470 (BABEL)
   - CVE-2018-14466 (AFS/RX)
   - CVE-2018-14461 (LDP)
   - CVE-2018-14462 (ICMP)
   - CVE-2018-14465 (RSVP)
   - CVE-2018-14464 (LMP)
   - CVE-2019-15166 (LMP)
   - CVE-2018-14880 (OSPF6)
   - CVE-2018-14882 (RPL)
   - CVE-2018-16227 (802.11)
   - CVE-2018-16229 (DCCP)
   - CVE-2018-14467 (BGP)
   - CVE-2018-14881 (BGP)
   - CVE-2018-16230 (BGP)
   - CVE-2018-16300 (BGP)
   - CVE-2018-14463 (VRRP)
   - CVE-2019-15167 (VRRP)
   - CVE-2018-14879 (tcpdump -V)
   - CVE-2018-16228 (HNCP) is a duplicate of the already fixed
     CVE-2019-1010220
   - CVE-2018-16301 (fixed in libpcap)
   - CVE-2018-16451 (SMB)
   - CVE-2018-16452 (SMB)
   - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled)
   - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1



Package List:

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      tcpdump-4.9.2-14.17.1
      tcpdump-debuginfo-4.9.2-14.17.1
      tcpdump-debugsource-4.9.2-14.17.1


References:

   https://www.suse.com/security/cve/CVE-2017-16808.html
   https://www.suse.com/security/cve/CVE-2018-10103.html
   https://www.suse.com/security/cve/CVE-2018-10105.html
   https://www.suse.com/security/cve/CVE-2018-14461.html
   https://www.suse.com/security/cve/CVE-2018-14462.html
   https://www.suse.com/security/cve/CVE-2018-14463.html
   https://www.suse.com/security/cve/CVE-2018-14464.html
   https://www.suse.com/security/cve/CVE-2018-14465.html
   https://www.suse.com/security/cve/CVE-2018-14466.html
   https://www.suse.com/security/cve/CVE-2018-14467.html
   https://www.suse.com/security/cve/CVE-2018-14468.html
   https://www.suse.com/security/cve/CVE-2018-14469.html
   https://www.suse.com/security/cve/CVE-2018-14470.html
   https://www.suse.com/security/cve/CVE-2018-14879.html
   https://www.suse.com/security/cve/CVE-2018-14880.html
   https://www.suse.com/security/cve/CVE-2018-14881.html
   https://www.suse.com/security/cve/CVE-2018-14882.html
   https://www.suse.com/security/cve/CVE-2018-16227.html
   https://www.suse.com/security/cve/CVE-2018-16228.html
   https://www.suse.com/security/cve/CVE-2018-16229.html
   https://www.suse.com/security/cve/CVE-2018-16230.html
   https://www.suse.com/security/cve/CVE-2018-16300.html
   https://www.suse.com/security/cve/CVE-2018-16301.html
   https://www.suse.com/security/cve/CVE-2018-16451.html
   https://www.suse.com/security/cve/CVE-2018-16452.html
   https://www.suse.com/security/cve/CVE-2019-1010220.html
   https://www.suse.com/security/cve/CVE-2019-15166.html
   https://www.suse.com/security/cve/CVE-2019-15167.html
   https://www.suse.com/security/cve/CVE-2020-8037.html
   https://bugzilla.suse.com/1153098
   https://bugzilla.suse.com/1153332
   https://bugzilla.suse.com/1178466