SUSE: 2020:3360-1 moderate: tcpdump
Summary
This update for tcpdump fixes the following issues: - CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466). The previous update of tcpdump already fixed variuous Buffer overflow/overread vulnerabilities [bsc#1153098, bsc#1153332] - CVE-2017-16808 (AoE) - CVE-2018-14468 (FrameRelay) - CVE-2018-14469 (IKEv1) - CVE-2018-14470 (BABEL) - CVE-2018-14466 (AFS/RX) - CVE-2018-14461 (LDP) - CVE-2018-14462 (ICMP) - CVE-2018-14465 (RSVP) - CVE-2018-14464 (LMP) - CVE-2019-15166 (LMP) - CVE-2018-14880 (OSPF6) - CVE-2018-14882 (RPL) - CVE-2018-16227 (802.11) - CVE-2018-16229 (DCCP) - CVE-2018-14467 (BGP) - CVE-2018-14881 (BGP) - CVE-2018-16230 (BGP) - CVE-2018-16300 (BGP) - CVE-2018-14463 (VRRP) - CVE-2019-15167 (VRRP) - CVE-2018-14879 (tcpdump -V) - CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220 - CVE-2018-16301 (fixed in libpcap) - CVE-2018-16451 (SMB) - CVE-2018-16452 (SMB) - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1 Package List: - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): tcpdump-4.9.2-14.17.1 tcpdump-debuginfo-4.9.2-14.17.1 tcpdump-debugsource-4.9.2-14.17.1
References
#1153098 #1153332 #1178466
Cross- CVE-2017-16808 CVE-2018-10103 CVE-2018-10105
CVE-2018-14461 CVE-2018-14462 CVE-2018-14463
CVE-2018-14464 CVE-2018-14465 CVE-2018-14466
CVE-2018-14467 CVE-2018-14468 CVE-2018-14469
CVE-2018-14470 CVE-2018-14879 CVE-2018-14880
CVE-2018-14881 CVE-2018-14882 CVE-2018-16227
CVE-2018-16228 CVE-2018-16229 CVE-2018-16230
CVE-2018-16300 CVE-2018-16301 CVE-2018-16451
CVE-2018-16452 CVE-2019-1010220 CVE-2019-15166
CVE-2019-15167 CVE-2020-8037
Affected Products:
SUSE Linux Enterprise Server 12-SP5
https://www.suse.com/security/cve/CVE-2017-16808.html
https://www.suse.com/security/cve/CVE-2018-10103.html
https://www.suse.com/security/cve/CVE-2018-10105.html
https://www.suse.com/security/cve/CVE-2018-14461.html
https://www.suse.com/security/cve/CVE-2018-14462.html
https://www.suse.com/security/cve/CVE-2018-14463.html
https://www.suse.com/security/cve/CVE-2018-14464.html
https://www.suse.com/security/cve/CVE-2018-14465.html
https://www.suse.com/security/cve/CVE-2018-14466.html
https://www.suse.com/security/cve/CVE-2018-14467.html
https://www.suse.com/security/cve/CVE-2018-14468.html
https://www.suse.com/security/cve/CVE-2018-14469.html
https://www.suse.com/security/cve/CVE-2018-14470.html
https://www.suse.com/security/cve/CVE-2018-14879.html
https://www.suse.com/security/cve/CVE-2018-14880.html
https://www.suse.com/security/cve/CVE-2018-14881.html
https://www.suse.com/security/cve/CVE-2018-14882.html
https://www.suse.com/security/cve/CVE-2018-16227.html
https://www.suse.com/security/cve/CVE-2018-16228.html
https://www.suse.com/security/cve/CVE-2018-16229.html
https://www.suse.com/security/cve/CVE-2018-16230.html
https://www.suse.com/security/cve/CVE-2018-16300.html
https://www.suse.com/security/cve/CVE-2018-16301.html
https://www.suse.com/security/cve/CVE-2018-16451.html
https://www.suse.com/security/cve/CVE-2018-16452.html
https://www.suse.com/security/cve/CVE-2019-1010220.html
https://www.suse.com/security/cve/CVE-2019-15166.html
https://www.suse.com/security/cve/CVE-2019-15167.html
https://www.suse.com/security/cve/CVE-2020-8037.html
https://bugzilla.suse.com/1153098
https://bugzilla.suse.com/1153332
https://bugzilla.suse.com/1178466