SUSE-SU-2017:2854-1: moderate: Security update for tcpdump
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Oct 26 07:08:30 MDT 2017
SUSE Security Update: Security update for tcpdump
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2854-1
Rating: moderate
References: #1047873 #1057247
Cross-References: CVE-2017-11108 CVE-2017-11541 CVE-2017-11542
CVE-2017-11543 CVE-2017-12893 CVE-2017-12894
CVE-2017-12895 CVE-2017-12896 CVE-2017-12897
CVE-2017-12898 CVE-2017-12899 CVE-2017-12900
CVE-2017-12901 CVE-2017-12902 CVE-2017-12985
CVE-2017-12986 CVE-2017-12987 CVE-2017-12988
CVE-2017-12989 CVE-2017-12990 CVE-2017-12991
CVE-2017-12992 CVE-2017-12993 CVE-2017-12994
CVE-2017-12995 CVE-2017-12996 CVE-2017-12997
CVE-2017-12998 CVE-2017-12999 CVE-2017-13000
CVE-2017-13001 CVE-2017-13002 CVE-2017-13003
CVE-2017-13004 CVE-2017-13005 CVE-2017-13006
CVE-2017-13007 CVE-2017-13008 CVE-2017-13009
CVE-2017-13010 CVE-2017-13011 CVE-2017-13012
CVE-2017-13013 CVE-2017-13014 CVE-2017-13015
CVE-2017-13016 CVE-2017-13017 CVE-2017-13018
CVE-2017-13019 CVE-2017-13020 CVE-2017-13021
CVE-2017-13022 CVE-2017-13023 CVE-2017-13024
CVE-2017-13025 CVE-2017-13026 CVE-2017-13027
CVE-2017-13028 CVE-2017-13029 CVE-2017-13030
CVE-2017-13031 CVE-2017-13032 CVE-2017-13033
CVE-2017-13034 CVE-2017-13035 CVE-2017-13036
CVE-2017-13037 CVE-2017-13038 CVE-2017-13039
CVE-2017-13040 CVE-2017-13041 CVE-2017-13042
CVE-2017-13043 CVE-2017-13044 CVE-2017-13045
CVE-2017-13046 CVE-2017-13047 CVE-2017-13048
CVE-2017-13049 CVE-2017-13050 CVE-2017-13051
CVE-2017-13052 CVE-2017-13053 CVE-2017-13054
CVE-2017-13055 CVE-2017-13687 CVE-2017-13688
CVE-2017-13689 CVE-2017-13690 CVE-2017-13725
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 90 vulnerabilities is now available.
Description:
This update for tcpdump to version 4.9.2 fixes several issues.
These security issues were fixed:
- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer
over-read and application crash) via crafted packet data. The crash
occured in the EXTRACT_16BITS function, called from the stp_print
function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function
in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that
allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print
function in print-lldp.c, related to util-print.c that allowed remote
DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print
function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers
that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol
parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header
parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol
parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation
header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header
parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1776=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1776=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1776=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1776=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1776=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
tcpdump-4.9.2-14.5.1
tcpdump-debuginfo-4.9.2-14.5.1
tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
tcpdump-4.9.2-14.5.1
tcpdump-debuginfo-4.9.2-14.5.1
tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
tcpdump-4.9.2-14.5.1
tcpdump-debuginfo-4.9.2-14.5.1
tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
tcpdump-4.9.2-14.5.1
tcpdump-debuginfo-4.9.2-14.5.1
tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
tcpdump-4.9.2-14.5.1
tcpdump-debuginfo-4.9.2-14.5.1
tcpdump-debugsource-4.9.2-14.5.1
References:
https://www.suse.com/security/cve/CVE-2017-11108.html
https://www.suse.com/security/cve/CVE-2017-11541.html
https://www.suse.com/security/cve/CVE-2017-11542.html
https://www.suse.com/security/cve/CVE-2017-11543.html
https://www.suse.com/security/cve/CVE-2017-12893.html
https://www.suse.com/security/cve/CVE-2017-12894.html
https://www.suse.com/security/cve/CVE-2017-12895.html
https://www.suse.com/security/cve/CVE-2017-12896.html
https://www.suse.com/security/cve/CVE-2017-12897.html
https://www.suse.com/security/cve/CVE-2017-12898.html
https://www.suse.com/security/cve/CVE-2017-12899.html
https://www.suse.com/security/cve/CVE-2017-12900.html
https://www.suse.com/security/cve/CVE-2017-12901.html
https://www.suse.com/security/cve/CVE-2017-12902.html
https://www.suse.com/security/cve/CVE-2017-12985.html
https://www.suse.com/security/cve/CVE-2017-12986.html
https://www.suse.com/security/cve/CVE-2017-12987.html
https://www.suse.com/security/cve/CVE-2017-12988.html
https://www.suse.com/security/cve/CVE-2017-12989.html
https://www.suse.com/security/cve/CVE-2017-12990.html
https://www.suse.com/security/cve/CVE-2017-12991.html
https://www.suse.com/security/cve/CVE-2017-12992.html
https://www.suse.com/security/cve/CVE-2017-12993.html
https://www.suse.com/security/cve/CVE-2017-12994.html
https://www.suse.com/security/cve/CVE-2017-12995.html
https://www.suse.com/security/cve/CVE-2017-12996.html
https://www.suse.com/security/cve/CVE-2017-12997.html
https://www.suse.com/security/cve/CVE-2017-12998.html
https://www.suse.com/security/cve/CVE-2017-12999.html
https://www.suse.com/security/cve/CVE-2017-13000.html
https://www.suse.com/security/cve/CVE-2017-13001.html
https://www.suse.com/security/cve/CVE-2017-13002.html
https://www.suse.com/security/cve/CVE-2017-13003.html
https://www.suse.com/security/cve/CVE-2017-13004.html
https://www.suse.com/security/cve/CVE-2017-13005.html
https://www.suse.com/security/cve/CVE-2017-13006.html
https://www.suse.com/security/cve/CVE-2017-13007.html
https://www.suse.com/security/cve/CVE-2017-13008.html
https://www.suse.com/security/cve/CVE-2017-13009.html
https://www.suse.com/security/cve/CVE-2017-13010.html
https://www.suse.com/security/cve/CVE-2017-13011.html
https://www.suse.com/security/cve/CVE-2017-13012.html
https://www.suse.com/security/cve/CVE-2017-13013.html
https://www.suse.com/security/cve/CVE-2017-13014.html
https://www.suse.com/security/cve/CVE-2017-13015.html
https://www.suse.com/security/cve/CVE-2017-13016.html
https://www.suse.com/security/cve/CVE-2017-13017.html
https://www.suse.com/security/cve/CVE-2017-13018.html
https://www.suse.com/security/cve/CVE-2017-13019.html
https://www.suse.com/security/cve/CVE-2017-13020.html
https://www.suse.com/security/cve/CVE-2017-13021.html
https://www.suse.com/security/cve/CVE-2017-13022.html
https://www.suse.com/security/cve/CVE-2017-13023.html
https://www.suse.com/security/cve/CVE-2017-13024.html
https://www.suse.com/security/cve/CVE-2017-13025.html
https://www.suse.com/security/cve/CVE-2017-13026.html
https://www.suse.com/security/cve/CVE-2017-13027.html
https://www.suse.com/security/cve/CVE-2017-13028.html
https://www.suse.com/security/cve/CVE-2017-13029.html
https://www.suse.com/security/cve/CVE-2017-13030.html
https://www.suse.com/security/cve/CVE-2017-13031.html
https://www.suse.com/security/cve/CVE-2017-13032.html
https://www.suse.com/security/cve/CVE-2017-13033.html
https://www.suse.com/security/cve/CVE-2017-13034.html
https://www.suse.com/security/cve/CVE-2017-13035.html
https://www.suse.com/security/cve/CVE-2017-13036.html
https://www.suse.com/security/cve/CVE-2017-13037.html
https://www.suse.com/security/cve/CVE-2017-13038.html
https://www.suse.com/security/cve/CVE-2017-13039.html
https://www.suse.com/security/cve/CVE-2017-13040.html
https://www.suse.com/security/cve/CVE-2017-13041.html
https://www.suse.com/security/cve/CVE-2017-13042.html
https://www.suse.com/security/cve/CVE-2017-13043.html
https://www.suse.com/security/cve/CVE-2017-13044.html
https://www.suse.com/security/cve/CVE-2017-13045.html
https://www.suse.com/security/cve/CVE-2017-13046.html
https://www.suse.com/security/cve/CVE-2017-13047.html
https://www.suse.com/security/cve/CVE-2017-13048.html
https://www.suse.com/security/cve/CVE-2017-13049.html
https://www.suse.com/security/cve/CVE-2017-13050.html
https://www.suse.com/security/cve/CVE-2017-13051.html
https://www.suse.com/security/cve/CVE-2017-13052.html
https://www.suse.com/security/cve/CVE-2017-13053.html
https://www.suse.com/security/cve/CVE-2017-13054.html
https://www.suse.com/security/cve/CVE-2017-13055.html
https://www.suse.com/security/cve/CVE-2017-13687.html
https://www.suse.com/security/cve/CVE-2017-13688.html
https://www.suse.com/security/cve/CVE-2017-13689.html
https://www.suse.com/security/cve/CVE-2017-13690.html
https://www.suse.com/security/cve/CVE-2017-13725.html
https://bugzilla.suse.com/1047873
https://bugzilla.suse.com/1057247
More information about the sle-security-updates
mailing list