SUSE-SU-2019:14191-1: important: Security update for tcpdump
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Tue Oct 15 07:11:19 MDT 2019
SUSE Security Update: Security update for tcpdump
______________________________________________________________________________
Announcement ID: SUSE-SU-2019:14191-1
Rating: important
References: #1057247 #1153098 #1153332
Cross-References: CVE-2017-12893 CVE-2017-12894 CVE-2017-12896
CVE-2017-12897 CVE-2017-12898 CVE-2017-12899
CVE-2017-12900 CVE-2017-12901 CVE-2017-12902
CVE-2017-12985 CVE-2017-12986 CVE-2017-12987
CVE-2017-12988 CVE-2017-12991 CVE-2017-12992
CVE-2017-12993 CVE-2017-12995 CVE-2017-12996
CVE-2017-12998 CVE-2017-12999 CVE-2017-13001
CVE-2017-13002 CVE-2017-13003 CVE-2017-13004
CVE-2017-13005 CVE-2017-13006 CVE-2017-13008
CVE-2017-13009 CVE-2017-13010 CVE-2017-13012
CVE-2017-13013 CVE-2017-13014 CVE-2017-13016
CVE-2017-13017 CVE-2017-13018 CVE-2017-13019
CVE-2017-13021 CVE-2017-13022 CVE-2017-13023
CVE-2017-13024 CVE-2017-13025 CVE-2017-13027
CVE-2017-13028 CVE-2017-13029 CVE-2017-13030
CVE-2017-13031 CVE-2017-13032 CVE-2017-13034
CVE-2017-13035 CVE-2017-13036 CVE-2017-13037
CVE-2017-13038 CVE-2017-13041 CVE-2017-13047
CVE-2017-13048 CVE-2017-13049 CVE-2017-13051
CVE-2017-13053 CVE-2017-13055 CVE-2017-13687
CVE-2017-13688 CVE-2017-13689 CVE-2017-13725
CVE-2018-10103 CVE-2018-10105 CVE-2018-14461
CVE-2018-14462 CVE-2018-14463 CVE-2018-14464
CVE-2018-14465 CVE-2018-14466 CVE-2018-14467
CVE-2018-14468 CVE-2018-14469 CVE-2018-14881
CVE-2018-14882 CVE-2018-16229 CVE-2018-16230
CVE-2018-16300 CVE-2018-16301 CVE-2018-16451
CVE-2018-16452 CVE-2019-15166
Affected Products:
SUSE Linux Enterprise Server 11-SP4-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes 83 vulnerabilities is now available.
Description:
This update for tcpdump fixes the following issues:
Security issues fixed:
- CVE-2017-12995: Fixed an infinite loop in the DNS parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-12893: Fixed a buffer over-read in the SMB/CIFS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12894: Fixed a buffer over-read in several protocol parsers
that allowed remote DoS (bsc#1057247).
- CVE-2017-12896: Fixed a buffer over-read in the ISAKMP parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12897: Fixed a buffer over-read in the ISO CLNS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12898: Fixed a buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-12899: Fixed a buffer over-read in the DECnet parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12900: Fixed a buffer over-read in the in several protocol
parsers that allowed remote DoS (bsc#1057247).
- CVE-2017-12901: Fixed a buffer over-read in the EIGRP parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12902: Fixed a buffer over-read in the Zephyr parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12985: Fixed a buffer over-read in the IPv6 parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-12986: Fixed a buffer over-read in the IPv6 routing header
parser that allowed remote DoS (bsc#1057247).
- CVE-2017-12987: Fixed a buffer over-read in the 802.11 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12988: Fixed a buffer over-read in the telnet parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12991: Fixed a buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-12992: Fixed a buffer over-read in the RIPng parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12993: Fixed a buffer over-read in the Juniper protocols parser
that allowed remote DoS (bsc#1057247).
- CVE-2017-12996: Fixed a buffer over-read in the PIMv2 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12998: Fixed a buffer over-read in the IS-IS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-12999: Fixed a buffer over-read in the IS-IS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13001: Fixed a buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13002: Fixed a buffer over-read in the AODV parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13003: Fixed a buffer over-read in the LMP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13004: Fixed a buffer over-read in the Juniper protocols parser
that allowed remote DoS (bsc#1057247).
- CVE-2017-13005: Fixed a buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13006: Fixed a buffer over-read in the L2TP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13008: Fixed a buffer over-read in the IEEE 802.11 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13009: Fixed a buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247).
- CVE-2017-13010: Fixed a buffer over-read in the BEEP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13012: Fixed a buffer over-read in the ICMP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13013: Fixed a buffer over-read in the ARP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13014: Fixed a buffer over-read in the White Board protocol
parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13016: Fixed a buffer over-read in the ISO ES-IS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13017: Fixed a buffer over-read in the DHCPv6 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13018: Fixed a buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13019: Fixed a buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13021: Fixed a buffer over-read in the ICMPv6 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13022: Fixed a buffer over-read in the IP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13023: Fixed a buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247).
- CVE-2017-13024: Fixed a buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247).
- CVE-2017-13025: Fixed a buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247).
- CVE-2017-13027: Fixed a buffer over-read in the LLDP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13028: Fixed a buffer over-read in the BOOTP parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13029: Fixed a buffer over-read in the PPP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13030: Fixed a buffer over-read in the PIM parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13031: Fixed a buffer over-read in the IPv6 fragmentation
header parser that allowed remote DoS (bsc#1057247).
- CVE-2017-13032: Fixed a buffer over-read in the RADIUS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13034: Fixed a buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13035: Fixed a buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13036: Fixed a buffer over-read in the OSPFv3 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13037: Fixed a buffer over-read in the IP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13038: Fixed a buffer over-read in the PPP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13041: Fixed a buffer over-read in the ICMPv6 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13047: Fixed a buffer over-read in the ISO ES-IS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13048: Fixed a buffer over-read in the RSVP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13049: Fixed a buffer over-read in the Rx protocol parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13051: Fixed a buffer over-read in the RSVP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13053: Fixed a buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13055: Fixed a buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13687: Fixed a buffer over-read in the Cisco HDLC parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13688: Fixed a buffer over-read in the OLSR parser that allowed
remote DoS (bsc#1057247).
- CVE-2017-13689: Fixed a buffer over-read in the IKEv1 parser that
allowed remote DoS (bsc#1057247).
- CVE-2017-13725: Fixed a buffer over-read in the IPv6 routing header
parser that allowed remote DoS (bsc#1057247).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data
(bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data
(bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print
(bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print
(bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print
(bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in
print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print
(bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find
(bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in
print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print
(bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print
(bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser
(bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser
(bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in
print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that
allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in
print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN
(bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata
(bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs
(bsc#1153098).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP4-LTSS:
zypper in -t patch slessp4-tcpdump-14191=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-tcpdump-14191=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-tcpdump-14191=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-tcpdump-14191=1
Package List:
- SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):
tcpdump-3.9.8-1.30.13.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
tcpdump-3.9.8-1.30.13.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):
tcpdump-debuginfo-3.9.8-1.30.13.1
tcpdump-debugsource-3.9.8-1.30.13.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
tcpdump-debuginfo-3.9.8-1.30.13.1
tcpdump-debugsource-3.9.8-1.30.13.1
References:
https://www.suse.com/security/cve/CVE-2017-12893.html
https://www.suse.com/security/cve/CVE-2017-12894.html
https://www.suse.com/security/cve/CVE-2017-12896.html
https://www.suse.com/security/cve/CVE-2017-12897.html
https://www.suse.com/security/cve/CVE-2017-12898.html
https://www.suse.com/security/cve/CVE-2017-12899.html
https://www.suse.com/security/cve/CVE-2017-12900.html
https://www.suse.com/security/cve/CVE-2017-12901.html
https://www.suse.com/security/cve/CVE-2017-12902.html
https://www.suse.com/security/cve/CVE-2017-12985.html
https://www.suse.com/security/cve/CVE-2017-12986.html
https://www.suse.com/security/cve/CVE-2017-12987.html
https://www.suse.com/security/cve/CVE-2017-12988.html
https://www.suse.com/security/cve/CVE-2017-12991.html
https://www.suse.com/security/cve/CVE-2017-12992.html
https://www.suse.com/security/cve/CVE-2017-12993.html
https://www.suse.com/security/cve/CVE-2017-12995.html
https://www.suse.com/security/cve/CVE-2017-12996.html
https://www.suse.com/security/cve/CVE-2017-12998.html
https://www.suse.com/security/cve/CVE-2017-12999.html
https://www.suse.com/security/cve/CVE-2017-13001.html
https://www.suse.com/security/cve/CVE-2017-13002.html
https://www.suse.com/security/cve/CVE-2017-13003.html
https://www.suse.com/security/cve/CVE-2017-13004.html
https://www.suse.com/security/cve/CVE-2017-13005.html
https://www.suse.com/security/cve/CVE-2017-13006.html
https://www.suse.com/security/cve/CVE-2017-13008.html
https://www.suse.com/security/cve/CVE-2017-13009.html
https://www.suse.com/security/cve/CVE-2017-13010.html
https://www.suse.com/security/cve/CVE-2017-13012.html
https://www.suse.com/security/cve/CVE-2017-13013.html
https://www.suse.com/security/cve/CVE-2017-13014.html
https://www.suse.com/security/cve/CVE-2017-13016.html
https://www.suse.com/security/cve/CVE-2017-13017.html
https://www.suse.com/security/cve/CVE-2017-13018.html
https://www.suse.com/security/cve/CVE-2017-13019.html
https://www.suse.com/security/cve/CVE-2017-13021.html
https://www.suse.com/security/cve/CVE-2017-13022.html
https://www.suse.com/security/cve/CVE-2017-13023.html
https://www.suse.com/security/cve/CVE-2017-13024.html
https://www.suse.com/security/cve/CVE-2017-13025.html
https://www.suse.com/security/cve/CVE-2017-13027.html
https://www.suse.com/security/cve/CVE-2017-13028.html
https://www.suse.com/security/cve/CVE-2017-13029.html
https://www.suse.com/security/cve/CVE-2017-13030.html
https://www.suse.com/security/cve/CVE-2017-13031.html
https://www.suse.com/security/cve/CVE-2017-13032.html
https://www.suse.com/security/cve/CVE-2017-13034.html
https://www.suse.com/security/cve/CVE-2017-13035.html
https://www.suse.com/security/cve/CVE-2017-13036.html
https://www.suse.com/security/cve/CVE-2017-13037.html
https://www.suse.com/security/cve/CVE-2017-13038.html
https://www.suse.com/security/cve/CVE-2017-13041.html
https://www.suse.com/security/cve/CVE-2017-13047.html
https://www.suse.com/security/cve/CVE-2017-13048.html
https://www.suse.com/security/cve/CVE-2017-13049.html
https://www.suse.com/security/cve/CVE-2017-13051.html
https://www.suse.com/security/cve/CVE-2017-13053.html
https://www.suse.com/security/cve/CVE-2017-13055.html
https://www.suse.com/security/cve/CVE-2017-13687.html
https://www.suse.com/security/cve/CVE-2017-13688.html
https://www.suse.com/security/cve/CVE-2017-13689.html
https://www.suse.com/security/cve/CVE-2017-13725.html
https://www.suse.com/security/cve/CVE-2018-10103.html
https://www.suse.com/security/cve/CVE-2018-10105.html
https://www.suse.com/security/cve/CVE-2018-14461.html
https://www.suse.com/security/cve/CVE-2018-14462.html
https://www.suse.com/security/cve/CVE-2018-14463.html
https://www.suse.com/security/cve/CVE-2018-14464.html
https://www.suse.com/security/cve/CVE-2018-14465.html
https://www.suse.com/security/cve/CVE-2018-14466.html
https://www.suse.com/security/cve/CVE-2018-14467.html
https://www.suse.com/security/cve/CVE-2018-14468.html
https://www.suse.com/security/cve/CVE-2018-14469.html
https://www.suse.com/security/cve/CVE-2018-14881.html
https://www.suse.com/security/cve/CVE-2018-14882.html
https://www.suse.com/security/cve/CVE-2018-16229.html
https://www.suse.com/security/cve/CVE-2018-16230.html
https://www.suse.com/security/cve/CVE-2018-16300.html
https://www.suse.com/security/cve/CVE-2018-16301.html
https://www.suse.com/security/cve/CVE-2018-16451.html
https://www.suse.com/security/cve/CVE-2018-16452.html
https://www.suse.com/security/cve/CVE-2019-15166.html
https://bugzilla.suse.com/1057247
https://bugzilla.suse.com/1153098
https://bugzilla.suse.com/1153332
More information about the sle-updates
mailing list