SUSE-SU-2017:2854-1: moderate: Security update for tcpdump

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Oct 26 07:08:30 MDT 2017


   SUSE Security Update: Security update for tcpdump
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2854-1
Rating:             moderate
References:         #1047873 #1057247 
Cross-References:   CVE-2017-11108 CVE-2017-11541 CVE-2017-11542
                    CVE-2017-11543 CVE-2017-12893 CVE-2017-12894
                    CVE-2017-12895 CVE-2017-12896 CVE-2017-12897
                    CVE-2017-12898 CVE-2017-12899 CVE-2017-12900
                    CVE-2017-12901 CVE-2017-12902 CVE-2017-12985
                    CVE-2017-12986 CVE-2017-12987 CVE-2017-12988
                    CVE-2017-12989 CVE-2017-12990 CVE-2017-12991
                    CVE-2017-12992 CVE-2017-12993 CVE-2017-12994
                    CVE-2017-12995 CVE-2017-12996 CVE-2017-12997
                    CVE-2017-12998 CVE-2017-12999 CVE-2017-13000
                    CVE-2017-13001 CVE-2017-13002 CVE-2017-13003
                    CVE-2017-13004 CVE-2017-13005 CVE-2017-13006
                    CVE-2017-13007 CVE-2017-13008 CVE-2017-13009
                    CVE-2017-13010 CVE-2017-13011 CVE-2017-13012
                    CVE-2017-13013 CVE-2017-13014 CVE-2017-13015
                    CVE-2017-13016 CVE-2017-13017 CVE-2017-13018
                    CVE-2017-13019 CVE-2017-13020 CVE-2017-13021
                    CVE-2017-13022 CVE-2017-13023 CVE-2017-13024
                    CVE-2017-13025 CVE-2017-13026 CVE-2017-13027
                    CVE-2017-13028 CVE-2017-13029 CVE-2017-13030
                    CVE-2017-13031 CVE-2017-13032 CVE-2017-13033
                    CVE-2017-13034 CVE-2017-13035 CVE-2017-13036
                    CVE-2017-13037 CVE-2017-13038 CVE-2017-13039
                    CVE-2017-13040 CVE-2017-13041 CVE-2017-13042
                    CVE-2017-13043 CVE-2017-13044 CVE-2017-13045
                    CVE-2017-13046 CVE-2017-13047 CVE-2017-13048
                    CVE-2017-13049 CVE-2017-13050 CVE-2017-13051
                    CVE-2017-13052 CVE-2017-13053 CVE-2017-13054
                    CVE-2017-13055 CVE-2017-13687 CVE-2017-13688
                    CVE-2017-13689 CVE-2017-13690 CVE-2017-13725
                   
Affected Products:
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that fixes 90 vulnerabilities is now available.

Description:

   This update for tcpdump to version 4.9.2 fixes several issues.

   These security issues were fixed:

   - CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer
     over-read and application crash) via crafted packet data. The crash
     occured in the EXTRACT_16BITS function, called from the stp_print
     function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
   - CVE-2017-11543: Prevent buffer overflow in the sliplink_print function
     in print-sl.c that allowed remote DoS (bsc#1057247).
   - CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print
     function in print-lldp.c, related to util-print.c that allowed remote
     DoS (bsc#1057247).
   - CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print
     function in print-pim.c that allowed remote DoS (bsc#1057247).
   - CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12894: Prevent buffer over-read in several protocol parsers
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12899: Prevent buffer over-read in the DECnet parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12900: Prevent buffer over-read in the in several protocol
     parsers that allowed remote DoS (bsc#1057247)
   - CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header
     parser that allowed remote DoS (bsc#1057247)
   - CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12988: Prevent buffer over-read in the telnet parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12992: Prevent buffer over-read in the RIPng parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13014: Prevent buffer over-read in the White Board protocol
     parser that allowed remote DoS (bsc#1057247)
   - CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser
     that allowed remote DoS (bsc#1057247)
   - CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation
     header parser that allowed remote DoS (bsc#1057247)
   - CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed
     remote DoS (bsc#1057247)
   - CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that
     allowed remote DoS (bsc#1057247)
   - CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header
     parser that allowed remote DoS (bsc#1057247)
   - Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1776=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1776=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1776=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1776=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1776=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      tcpdump-4.9.2-14.5.1
      tcpdump-debuginfo-4.9.2-14.5.1
      tcpdump-debugsource-4.9.2-14.5.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      tcpdump-4.9.2-14.5.1
      tcpdump-debuginfo-4.9.2-14.5.1
      tcpdump-debugsource-4.9.2-14.5.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

      tcpdump-4.9.2-14.5.1
      tcpdump-debuginfo-4.9.2-14.5.1
      tcpdump-debugsource-4.9.2-14.5.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      tcpdump-4.9.2-14.5.1
      tcpdump-debuginfo-4.9.2-14.5.1
      tcpdump-debugsource-4.9.2-14.5.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      tcpdump-4.9.2-14.5.1
      tcpdump-debuginfo-4.9.2-14.5.1
      tcpdump-debugsource-4.9.2-14.5.1


References:

   https://www.suse.com/security/cve/CVE-2017-11108.html
   https://www.suse.com/security/cve/CVE-2017-11541.html
   https://www.suse.com/security/cve/CVE-2017-11542.html
   https://www.suse.com/security/cve/CVE-2017-11543.html
   https://www.suse.com/security/cve/CVE-2017-12893.html
   https://www.suse.com/security/cve/CVE-2017-12894.html
   https://www.suse.com/security/cve/CVE-2017-12895.html
   https://www.suse.com/security/cve/CVE-2017-12896.html
   https://www.suse.com/security/cve/CVE-2017-12897.html
   https://www.suse.com/security/cve/CVE-2017-12898.html
   https://www.suse.com/security/cve/CVE-2017-12899.html
   https://www.suse.com/security/cve/CVE-2017-12900.html
   https://www.suse.com/security/cve/CVE-2017-12901.html
   https://www.suse.com/security/cve/CVE-2017-12902.html
   https://www.suse.com/security/cve/CVE-2017-12985.html
   https://www.suse.com/security/cve/CVE-2017-12986.html
   https://www.suse.com/security/cve/CVE-2017-12987.html
   https://www.suse.com/security/cve/CVE-2017-12988.html
   https://www.suse.com/security/cve/CVE-2017-12989.html
   https://www.suse.com/security/cve/CVE-2017-12990.html
   https://www.suse.com/security/cve/CVE-2017-12991.html
   https://www.suse.com/security/cve/CVE-2017-12992.html
   https://www.suse.com/security/cve/CVE-2017-12993.html
   https://www.suse.com/security/cve/CVE-2017-12994.html
   https://www.suse.com/security/cve/CVE-2017-12995.html
   https://www.suse.com/security/cve/CVE-2017-12996.html
   https://www.suse.com/security/cve/CVE-2017-12997.html
   https://www.suse.com/security/cve/CVE-2017-12998.html
   https://www.suse.com/security/cve/CVE-2017-12999.html
   https://www.suse.com/security/cve/CVE-2017-13000.html
   https://www.suse.com/security/cve/CVE-2017-13001.html
   https://www.suse.com/security/cve/CVE-2017-13002.html
   https://www.suse.com/security/cve/CVE-2017-13003.html
   https://www.suse.com/security/cve/CVE-2017-13004.html
   https://www.suse.com/security/cve/CVE-2017-13005.html
   https://www.suse.com/security/cve/CVE-2017-13006.html
   https://www.suse.com/security/cve/CVE-2017-13007.html
   https://www.suse.com/security/cve/CVE-2017-13008.html
   https://www.suse.com/security/cve/CVE-2017-13009.html
   https://www.suse.com/security/cve/CVE-2017-13010.html
   https://www.suse.com/security/cve/CVE-2017-13011.html
   https://www.suse.com/security/cve/CVE-2017-13012.html
   https://www.suse.com/security/cve/CVE-2017-13013.html
   https://www.suse.com/security/cve/CVE-2017-13014.html
   https://www.suse.com/security/cve/CVE-2017-13015.html
   https://www.suse.com/security/cve/CVE-2017-13016.html
   https://www.suse.com/security/cve/CVE-2017-13017.html
   https://www.suse.com/security/cve/CVE-2017-13018.html
   https://www.suse.com/security/cve/CVE-2017-13019.html
   https://www.suse.com/security/cve/CVE-2017-13020.html
   https://www.suse.com/security/cve/CVE-2017-13021.html
   https://www.suse.com/security/cve/CVE-2017-13022.html
   https://www.suse.com/security/cve/CVE-2017-13023.html
   https://www.suse.com/security/cve/CVE-2017-13024.html
   https://www.suse.com/security/cve/CVE-2017-13025.html
   https://www.suse.com/security/cve/CVE-2017-13026.html
   https://www.suse.com/security/cve/CVE-2017-13027.html
   https://www.suse.com/security/cve/CVE-2017-13028.html
   https://www.suse.com/security/cve/CVE-2017-13029.html
   https://www.suse.com/security/cve/CVE-2017-13030.html
   https://www.suse.com/security/cve/CVE-2017-13031.html
   https://www.suse.com/security/cve/CVE-2017-13032.html
   https://www.suse.com/security/cve/CVE-2017-13033.html
   https://www.suse.com/security/cve/CVE-2017-13034.html
   https://www.suse.com/security/cve/CVE-2017-13035.html
   https://www.suse.com/security/cve/CVE-2017-13036.html
   https://www.suse.com/security/cve/CVE-2017-13037.html
   https://www.suse.com/security/cve/CVE-2017-13038.html
   https://www.suse.com/security/cve/CVE-2017-13039.html
   https://www.suse.com/security/cve/CVE-2017-13040.html
   https://www.suse.com/security/cve/CVE-2017-13041.html
   https://www.suse.com/security/cve/CVE-2017-13042.html
   https://www.suse.com/security/cve/CVE-2017-13043.html
   https://www.suse.com/security/cve/CVE-2017-13044.html
   https://www.suse.com/security/cve/CVE-2017-13045.html
   https://www.suse.com/security/cve/CVE-2017-13046.html
   https://www.suse.com/security/cve/CVE-2017-13047.html
   https://www.suse.com/security/cve/CVE-2017-13048.html
   https://www.suse.com/security/cve/CVE-2017-13049.html
   https://www.suse.com/security/cve/CVE-2017-13050.html
   https://www.suse.com/security/cve/CVE-2017-13051.html
   https://www.suse.com/security/cve/CVE-2017-13052.html
   https://www.suse.com/security/cve/CVE-2017-13053.html
   https://www.suse.com/security/cve/CVE-2017-13054.html
   https://www.suse.com/security/cve/CVE-2017-13055.html
   https://www.suse.com/security/cve/CVE-2017-13687.html
   https://www.suse.com/security/cve/CVE-2017-13688.html
   https://www.suse.com/security/cve/CVE-2017-13689.html
   https://www.suse.com/security/cve/CVE-2017-13690.html
   https://www.suse.com/security/cve/CVE-2017-13725.html
   https://bugzilla.suse.com/1047873
   https://bugzilla.suse.com/1057247



More information about the sle-updates mailing list