Mailinglist Archive: opensuse-updates (101 mails)

< Previous Next >
openSUSE-SU-2015:0284-1: moderate: Security update for tcpdump
openSUSE Security Update: Security update for tcpdump

Announcement ID: openSUSE-SU-2015:0284-1
Rating: moderate
References: #905870 #905871 #905872
Cross-References: CVE-2014-8767 CVE-2014-8768 CVE-2014-8769

Affected Products:
openSUSE 13.2
openSUSE 13.1

An update that fixes three vulnerabilities is now available.


tcpdump was updated to fix three security issues.

These security issues were fixed:
- CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump
3.9.6 through 4.6.2, when in verbose mode, allowed remote attackers to
cause a denial of service (crash) via a crafted length value in an OLSR
frame (bnc#905870 905871).
- CVE-2014-8769: tcpdump 3.8 through 4.6.2 might allowed remote attackers
to obtain sensitive information from memory or cause a denial of service
(packet loss or segmentation fault) via a crafted Ad hoc On-Demand
Distance Vector (AODV) packet, which triggers an out-of-bounds memory
access (bnc#905871 905872).
- CVE-2014-8768: Multiple Integer underflows in the geonet_print function
in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allowed remote
attackers to cause a denial of service (segmentation fault and crash)
via a crafted length value in a Geonet frame (bnc#905871).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-146=1

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-146=1

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 13.2 (i586 x86_64):


- openSUSE 13.1 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages