openSUSE-SU-2015:0284-1: moderate: Security update for tcpdump
openSUSE Security Update: Security update for tcpdump ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:0284-1 Rating: moderate References: #905870 #905871 #905872 Cross-References: CVE-2014-8767 CVE-2014-8768 CVE-2014-8769 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: tcpdump was updated to fix three security issues. These security issues were fixed: - CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allowed remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame (bnc#905870 905871). - CVE-2014-8769: tcpdump 3.8 through 4.6.2 might allowed remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access (bnc#905871 905872). - CVE-2014-8768: Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allowed remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame (bnc#905871). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-146=1 - openSUSE 13.1: zypper in -t patch openSUSE-2015-146=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): tcpdump-4.6.2-4.1 tcpdump-debuginfo-4.6.2-4.1 tcpdump-debugsource-4.6.2-4.1 - openSUSE 13.1 (i586 x86_64): tcpdump-4.4.0-2.4.1 tcpdump-debuginfo-4.4.0-2.4.1 tcpdump-debugsource-4.4.0-2.4.1 References: http://support.novell.com/security/cve/CVE-2014-8767.html http://support.novell.com/security/cve/CVE-2014-8768.html http://support.novell.com/security/cve/CVE-2014-8769.html https://bugzilla.suse.com/905870 https://bugzilla.suse.com/905871 https://bugzilla.suse.com/905872
participants (1)
-
opensuse-security@opensuse.org