Security update for tcpdump
Announcement ID: | SUSE-SU-2020:3360-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 29 vulnerabilities can now be installed.
Description:
This update for tcpdump fixes the following issues:
- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).
The previous update of tcpdump already fixed variuous Buffer overflow/overread vulnerabilities [bsc#1153098, bsc#1153332]
- CVE-2017-16808 (AoE)
- CVE-2018-14468 (FrameRelay)
- CVE-2018-14469 (IKEv1)
- CVE-2018-14470 (BABEL)
- CVE-2018-14466 (AFS/RX)
- CVE-2018-14461 (LDP)
- CVE-2018-14462 (ICMP)
- CVE-2018-14465 (RSVP)
- CVE-2018-14464 (LMP)
- CVE-2019-15166 (LMP)
- CVE-2018-14880 (OSPF6)
- CVE-2018-14882 (RPL)
- CVE-2018-16227 (802.11)
- CVE-2018-16229 (DCCP)
- CVE-2018-14467 (BGP)
- CVE-2018-14881 (BGP)
- CVE-2018-16230 (BGP)
- CVE-2018-16300 (BGP)
- CVE-2018-14463 (VRRP)
- CVE-2019-15167 (VRRP)
- CVE-2018-14879 (tcpdump -V)
- CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220
- CVE-2018-16301 (fixed in libpcap)
- CVE-2018-16451 (SMB)
- CVE-2018-16452 (SMB)
- CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled)
- CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-3360=1
Package List:
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
- tcpdump-debugsource-4.9.2-14.17.1
- tcpdump-4.9.2-14.17.1
- tcpdump-debuginfo-4.9.2-14.17.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
- tcpdump-debugsource-4.9.2-14.17.1
- tcpdump-4.9.2-14.17.1
- tcpdump-debuginfo-4.9.2-14.17.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- tcpdump-debugsource-4.9.2-14.17.1
- tcpdump-4.9.2-14.17.1
- tcpdump-debuginfo-4.9.2-14.17.1
References:
- https://www.suse.com/security/cve/CVE-2017-16808.html
- https://www.suse.com/security/cve/CVE-2018-10103.html
- https://www.suse.com/security/cve/CVE-2018-10105.html
- https://www.suse.com/security/cve/CVE-2018-14461.html
- https://www.suse.com/security/cve/CVE-2018-14462.html
- https://www.suse.com/security/cve/CVE-2018-14463.html
- https://www.suse.com/security/cve/CVE-2018-14464.html
- https://www.suse.com/security/cve/CVE-2018-14465.html
- https://www.suse.com/security/cve/CVE-2018-14466.html
- https://www.suse.com/security/cve/CVE-2018-14467.html
- https://www.suse.com/security/cve/CVE-2018-14468.html
- https://www.suse.com/security/cve/CVE-2018-14469.html
- https://www.suse.com/security/cve/CVE-2018-14470.html
- https://www.suse.com/security/cve/CVE-2018-14879.html
- https://www.suse.com/security/cve/CVE-2018-14880.html
- https://www.suse.com/security/cve/CVE-2018-14881.html
- https://www.suse.com/security/cve/CVE-2018-14882.html
- https://www.suse.com/security/cve/CVE-2018-16227.html
- https://www.suse.com/security/cve/CVE-2018-16228.html
- https://www.suse.com/security/cve/CVE-2018-16229.html
- https://www.suse.com/security/cve/CVE-2018-16230.html
- https://www.suse.com/security/cve/CVE-2018-16300.html
- https://www.suse.com/security/cve/CVE-2018-16301.html
- https://www.suse.com/security/cve/CVE-2018-16451.html
- https://www.suse.com/security/cve/CVE-2018-16452.html
- https://www.suse.com/security/cve/CVE-2019-1010220.html
- https://www.suse.com/security/cve/CVE-2019-15166.html
- https://www.suse.com/security/cve/CVE-2019-15167.html
- https://www.suse.com/security/cve/CVE-2020-8037.html
- https://bugzilla.suse.com/show_bug.cgi?id=1153098
- https://bugzilla.suse.com/show_bug.cgi?id=1153332
- https://bugzilla.suse.com/show_bug.cgi?id=1178466