openSUSE-SU-2017:2875-1: moderate: Security update for tcpdump
openSUSE Security Update: Security update for tcpdump ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:2875-1 Rating: moderate References: #1047873 #1057247 Cross-References: CVE-2017-11108 CVE-2017-11541 CVE-2017-11542 CVE-2017-11543 CVE-2017-12893 CVE-2017-12894 CVE-2017-12895 CVE-2017-12896 CVE-2017-12897 CVE-2017-12898 CVE-2017-12899 CVE-2017-12900 CVE-2017-12901 CVE-2017-12902 CVE-2017-12985 CVE-2017-12986 CVE-2017-12987 CVE-2017-12988 CVE-2017-12989 CVE-2017-12990 CVE-2017-12991 CVE-2017-12992 CVE-2017-12993 CVE-2017-12994 CVE-2017-12995 CVE-2017-12996 CVE-2017-12997 CVE-2017-12998 CVE-2017-12999 CVE-2017-13000 CVE-2017-13001 CVE-2017-13002 CVE-2017-13003 CVE-2017-13004 CVE-2017-13005 CVE-2017-13006 CVE-2017-13007 CVE-2017-13008 CVE-2017-13009 CVE-2017-13010 CVE-2017-13011 CVE-2017-13012 CVE-2017-13013 CVE-2017-13014 CVE-2017-13015 CVE-2017-13016 CVE-2017-13017 CVE-2017-13018 CVE-2017-13019 CVE-2017-13020 CVE-2017-13021 CVE-2017-13022 CVE-2017-13023 CVE-2017-13024 CVE-2017-13025 CVE-2017-13026 CVE-2017-13027 CVE-2017-13028 CVE-2017-13029 CVE-2017-13030 CVE-2017-13031 CVE-2017-13032 CVE-2017-13033 CVE-2017-13034 CVE-2017-13035 CVE-2017-13036 CVE-2017-13037 CVE-2017-13038 CVE-2017-13039 CVE-2017-13040 CVE-2017-13041 CVE-2017-13042 CVE-2017-13043 CVE-2017-13044 CVE-2017-13045 CVE-2017-13046 CVE-2017-13047 CVE-2017-13048 CVE-2017-13049 CVE-2017-13050 CVE-2017-13051 CVE-2017-13052 CVE-2017-13053 CVE-2017-13054 CVE-2017-13055 CVE-2017-13687 CVE-2017-13688 CVE-2017-13689 CVE-2017-13690 CVE-2017-13725 Affected Products: openSUSE Leap 42.3 openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes 90 vulnerabilities is now available. Description: This update for tcpdump to version 4.9.2 fixes several issues. These security issues were fixed: - CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247). - CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247). - CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247) - CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247) - CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247) - CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247). - CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247). - CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247) - CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247) - CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247) - CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247) - CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247) - CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247) - CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247) - CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247) - CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247) - CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247) - CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247) - CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247) - CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247) - CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247) - CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247) - CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247) - CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247) - CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247) - CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247) - CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247) - CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247) - CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247) - CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247) - CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247) - CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247) - CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247) - CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247) - CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247) - CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247) - CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247) - CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247) - CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247) - CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247) - CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247) - CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247) - CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247) - Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2017-1205=1 - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-1205=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.3 (x86_64): tcpdump-4.9.2-9.1 tcpdump-debuginfo-4.9.2-9.1 tcpdump-debugsource-4.9.2-9.1 - openSUSE Leap 42.2 (x86_64): tcpdump-4.9.2-6.6.1 tcpdump-debuginfo-4.9.2-6.6.1 tcpdump-debugsource-4.9.2-6.6.1 References: https://www.suse.com/security/cve/CVE-2017-11108.html https://www.suse.com/security/cve/CVE-2017-11541.html https://www.suse.com/security/cve/CVE-2017-11542.html https://www.suse.com/security/cve/CVE-2017-11543.html https://www.suse.com/security/cve/CVE-2017-12893.html https://www.suse.com/security/cve/CVE-2017-12894.html https://www.suse.com/security/cve/CVE-2017-12895.html https://www.suse.com/security/cve/CVE-2017-12896.html https://www.suse.com/security/cve/CVE-2017-12897.html https://www.suse.com/security/cve/CVE-2017-12898.html https://www.suse.com/security/cve/CVE-2017-12899.html https://www.suse.com/security/cve/CVE-2017-12900.html https://www.suse.com/security/cve/CVE-2017-12901.html https://www.suse.com/security/cve/CVE-2017-12902.html https://www.suse.com/security/cve/CVE-2017-12985.html https://www.suse.com/security/cve/CVE-2017-12986.html https://www.suse.com/security/cve/CVE-2017-12987.html https://www.suse.com/security/cve/CVE-2017-12988.html https://www.suse.com/security/cve/CVE-2017-12989.html https://www.suse.com/security/cve/CVE-2017-12990.html https://www.suse.com/security/cve/CVE-2017-12991.html https://www.suse.com/security/cve/CVE-2017-12992.html https://www.suse.com/security/cve/CVE-2017-12993.html https://www.suse.com/security/cve/CVE-2017-12994.html https://www.suse.com/security/cve/CVE-2017-12995.html https://www.suse.com/security/cve/CVE-2017-12996.html https://www.suse.com/security/cve/CVE-2017-12997.html https://www.suse.com/security/cve/CVE-2017-12998.html https://www.suse.com/security/cve/CVE-2017-12999.html https://www.suse.com/security/cve/CVE-2017-13000.html https://www.suse.com/security/cve/CVE-2017-13001.html https://www.suse.com/security/cve/CVE-2017-13002.html https://www.suse.com/security/cve/CVE-2017-13003.html https://www.suse.com/security/cve/CVE-2017-13004.html https://www.suse.com/security/cve/CVE-2017-13005.html https://www.suse.com/security/cve/CVE-2017-13006.html https://www.suse.com/security/cve/CVE-2017-13007.html https://www.suse.com/security/cve/CVE-2017-13008.html https://www.suse.com/security/cve/CVE-2017-13009.html https://www.suse.com/security/cve/CVE-2017-13010.html https://www.suse.com/security/cve/CVE-2017-13011.html https://www.suse.com/security/cve/CVE-2017-13012.html https://www.suse.com/security/cve/CVE-2017-13013.html https://www.suse.com/security/cve/CVE-2017-13014.html https://www.suse.com/security/cve/CVE-2017-13015.html https://www.suse.com/security/cve/CVE-2017-13016.html https://www.suse.com/security/cve/CVE-2017-13017.html https://www.suse.com/security/cve/CVE-2017-13018.html https://www.suse.com/security/cve/CVE-2017-13019.html https://www.suse.com/security/cve/CVE-2017-13020.html https://www.suse.com/security/cve/CVE-2017-13021.html https://www.suse.com/security/cve/CVE-2017-13022.html https://www.suse.com/security/cve/CVE-2017-13023.html https://www.suse.com/security/cve/CVE-2017-13024.html https://www.suse.com/security/cve/CVE-2017-13025.html https://www.suse.com/security/cve/CVE-2017-13026.html https://www.suse.com/security/cve/CVE-2017-13027.html https://www.suse.com/security/cve/CVE-2017-13028.html https://www.suse.com/security/cve/CVE-2017-13029.html https://www.suse.com/security/cve/CVE-2017-13030.html https://www.suse.com/security/cve/CVE-2017-13031.html https://www.suse.com/security/cve/CVE-2017-13032.html https://www.suse.com/security/cve/CVE-2017-13033.html https://www.suse.com/security/cve/CVE-2017-13034.html https://www.suse.com/security/cve/CVE-2017-13035.html https://www.suse.com/security/cve/CVE-2017-13036.html https://www.suse.com/security/cve/CVE-2017-13037.html https://www.suse.com/security/cve/CVE-2017-13038.html https://www.suse.com/security/cve/CVE-2017-13039.html https://www.suse.com/security/cve/CVE-2017-13040.html https://www.suse.com/security/cve/CVE-2017-13041.html https://www.suse.com/security/cve/CVE-2017-13042.html https://www.suse.com/security/cve/CVE-2017-13043.html https://www.suse.com/security/cve/CVE-2017-13044.html https://www.suse.com/security/cve/CVE-2017-13045.html https://www.suse.com/security/cve/CVE-2017-13046.html https://www.suse.com/security/cve/CVE-2017-13047.html https://www.suse.com/security/cve/CVE-2017-13048.html https://www.suse.com/security/cve/CVE-2017-13049.html https://www.suse.com/security/cve/CVE-2017-13050.html https://www.suse.com/security/cve/CVE-2017-13051.html https://www.suse.com/security/cve/CVE-2017-13052.html https://www.suse.com/security/cve/CVE-2017-13053.html https://www.suse.com/security/cve/CVE-2017-13054.html https://www.suse.com/security/cve/CVE-2017-13055.html https://www.suse.com/security/cve/CVE-2017-13687.html https://www.suse.com/security/cve/CVE-2017-13688.html https://www.suse.com/security/cve/CVE-2017-13689.html https://www.suse.com/security/cve/CVE-2017-13690.html https://www.suse.com/security/cve/CVE-2017-13725.html https://bugzilla.suse.com/1047873 https://bugzilla.suse.com/1057247
participants (1)
-
opensuse-security@opensuse.org