Bug ID 927637
Summary VUL-0: CVE-2015-3138: tcpdump: denial of service in print-wb.c
Classification openSUSE
Product openSUSE Factory
Version 201503*
Hardware Other
URL https://smash.suse.de/issue/115973/
OS Other
Status NEW
Severity Minor
Priority P5 - None
Component Network
Assignee vcizek@suse.com
Reporter astieger@suse.com
QA Contact qa-bugs@suse.de
CC puzel@suse.com, smash_bz@suse.de
Found By Security Response Team
Blocker ---

Via RH:

Recently an independent researcher had discovered a vulnerability in tcpdump,
which would be a segmentation fault triggered through feeding into tcpdump a
crafted packet, either from a live network interface or from a .pcap file. It
has been assigned CVE-2015-3138 and you can find the steps to reproduce it
here:

https://github.com/the-tcpdump-group/tcpdump/issues/446

Subsequent analysis made it clear that the vulnerability was introduced into
one of tcpdump functions by an accident not long before the 4.7.0 release. It
remained in tcpdump releases 4.7.2 and 4.7.3 (4.7.1 was never released). The
next release, 4.7.4, will have it fixed, but it is likely to be delayed. Since
the vulnerability has been public for a few weeks, meanwhile you might want to
fix it in an update to the tcpdump package. The fix is in the following commit:

https://github.com/the-tcpdump-group/tcpdump/commit/3ed82f4ed0095768529afc22b923c8f7171fff70

openSUSE 13.1: 4.4.0 not affected
openSUSE 13.2: 4.6.2 not affected
network:utilities: 4.7.3 affected
openSUSE:Factory: 4.7.3 affected

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1212342
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3138


You are receiving this mail because: