Lucene search

K
suseSuseOPENSUSE-SU-2019:2348-1
HistoryOct 20, 2019 - 12:00 a.m.

Security update for tcpdump (important)

2019-10-2000:00:00
lists.opensuse.org
86

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

An update that fixes 28 vulnerabilities is now available.

Description:

This update for tcpdump fixes the following issues:

  • CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print
    and lookup_emem (bsc#1068716 bsc#1153098).
  • CVE-2018-10103: Fixed a mishandling of the printing of SMB data
    (bsc#1153098).
  • CVE-2018-10105: Fixed a mishandling of the printing of SMB data
    (bsc#1153098).
  • CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print
    (bsc#1153098).
  • CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print
    (bsc#1153098).
  • CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print
    (bsc#1153098).
  • CVE-2018-14464: Fixed a buffer over-read in
    print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
  • CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print
    (bsc#1153098).
  • CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find
    (bsc#1153098).
  • CVE-2018-14467: Fixed a buffer over-read in
    print-bgp.c:bgp_capabilities_print (bsc#1153098).
  • CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print
    (bsc#1153098).
  • CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print
    (bsc#1153098).
  • CVE-2018-14470: Fixed a buffer over-read in print-babel.c:babel_print_v2
    (bsc#1153098).
  • CVE-2018-14879: Fixed a buffer overflow in the command-line argument
    parser (bsc#1153098).
  • CVE-2018-14880: Fixed a buffer over-read in the OSPFv3 parser
    (bsc#1153098).
  • CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
  • CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser
    (bsc#1153098).
  • CVE-2018-16227: Fixed a buffer over-read in the IEEE 802.11 parser in
    print-802_11.c for the Mesh Flags subfield (bsc#1153098).
  • CVE-2018-16228: Fixed a buffer over-read in the HNCP parser
    (bsc#1153098).
  • CVE-2018-16229: Fixed a buffer over-read in the DCCP parser
    (bsc#1153098).
  • CVE-2018-16230: Fixed a buffer over-read in the BGP parser in
    print-bgp.c:bgp_attr_print (bsc#1153098).
  • CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that
    allowed denial-of-service by stack consumption (bsc#1153098).
  • CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
  • CVE-2018-16451: Fixed several buffer over-reads in
    print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN
    (bsc#1153098).
  • CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata
    (bsc#1153098).
  • CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs
    (bsc#1153098).
  • CVE-2019-15167: Fixed a vulnerability in VRRP (bsc#1153098).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2019-2348=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P