Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in tcpdump
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in tcpdump
ID: FEDORA-2019-85d92df70f
Distribution: Fedora
Plattformen: Fedora 29
Datum: Sa, 26. Oktober 2019, 09:23
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463
Applikationen: tcpdump

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-85d92df70f
2019-10-25 18:06:00.866633
-------------------------------------------------------------------------------
-

Name : tcpdump
Product : Fedora 29
Version : 4.9.3
Release : 1.fc29
URL : http://www.tcpdump.org
Summary : A network traffic monitoring tool
Description :
Tcpdump is a command-line tool for monitoring network traffic.
Tcpdump can capture and display the packet headers on a particular
network interface or on all interfaces. Tcpdump can display all of
the packet headers, or just the ones that match particular criteria.

Install tcpdump if you need a program to monitor network traffic.

-------------------------------------------------------------------------------
-
Update Information:

New version 4.9.3, Security fix for CVE-2017-16808, CVE-2018-14468,
CVE-2018-14469, CVE-2018-14470, CVE-2018-14466, CVE-2018-14461, CVE-2018-14462,
CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467,
CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882,
CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452,
CVE-2018-16300, CVE-2018-16228, CVE-2019-15166, CVE-2019-15167, CVE-2017-16808,
CVE-2018-14882, CVE-2018-19519
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Oct 14 2019 Michal Ruprich <mruprich@redhat.com> - 14:4.9.3-1
- New version 4.9.3
- Fixes CVE-2017-16808, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470,
CVE-2018-14466, CVE-2018-14461, CVE-2018-14462, CVE-2018-14465, CVE-2018-14881, CVE-2018-14464, CVE-2018-14463, CVE-2018-14467, CVE-2018-10103, CVE-2018-10105, CVE-2018-14880, CVE-2018-16451, CVE-2018-14882, CVE-2018-16227, CVE-2018-16229, CVE-2018-16301, CVE-2018-16230, CVE-2018-16452, CVE-2018-16300, CVE-2018-16228, CVE-2019-15166, CVE-2019-15167
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1760520 - CVE-2019-15166 tcpdump: Buffer overflow in
lmp_print_data_link_subobjs() in print-lmp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760520
[ 2 ] Bug #1760518 - CVE-2018-16452 tcpdump: Resource exhaustion in
smb_fdata() funtion in smbutil.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760518
[ 3 ] Bug #1760517 - CVE-2018-16451 tcpdump: Buffer over-read in
print_trans() function in print-smb.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760517
[ 4 ] Bug #1760516 - CVE-2018-16230 tcpdump: Buffer over-read in
bgp_attr_print() function in print-bgp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760516
[ 5 ] Bug #1760514 - CVE-2018-16228 tcpdump: Buffer over-read in
print_prefix() function in print-hncp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760514
[ 6 ] Bug #1760513 - CVE-2018-14470 tcpdump: Buffer over-read in
babel_print_v2() in print-babel.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760513
[ 7 ] Bug #1760512 - CVE-2018-14467 tcpdump: Buffer over-read in
bgp_capabilities_print() in print-bgp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760512
[ 8 ] Bug #1760509 - CVE-2018-14466 tcpdump: Buffer over-read in
print-icmp6.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760509
[ 9 ] Bug #1760507 - CVE-2018-14464 tcpdump: Buffer over-read in
lmp_print_data_link_subobjs() function in print-lmp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760507
[ 10 ] Bug #1760506 - CVE-2018-14461 tcpdump: Buffer over-read in
ldp_tlv_print() function in print-ldp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760506
[ 11 ] Bug #1760505 - CVE-2018-10105 tcpdump: SMB data printing mishandled
(issue 2 of 2)
https://bugzilla.redhat.com/show_bug.cgi?id=1760505
[ 12 ] Bug #1760504 - CVE-2018-10103 tcpdump: SMB data printing mishandled
(issue 1 of 2)
https://bugzilla.redhat.com/show_bug.cgi?id=1760504
[ 13 ] Bug #1760468 - CVE-2018-14880 tcpdump: Buffer over-read in
ospf6_print_lshdr() function in print-ospf6.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760468
[ 14 ] Bug #1760464 - CVE-2018-14468 tcpdump: Buffer over-read in mfr_print()
function in print-fr.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760464
[ 15 ] Bug #1760463 - CVE-2018-14881 tcpdump: Buffer over-read in
bgp_capabilities_print() function in print-bgp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760463
[ 16 ] Bug #1760461 - CVE-2018-16227 tcpdump: Buffer over-read in
print-802_11.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760461
[ 17 ] Bug #1760458 - CVE-2018-16229 tcpdump: Buffer over-read in
dccp_print_option() function in print-dccp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760458
[ 18 ] Bug #1760457 - CVE-2018-14879 tcpdump: Buffer overflow in
get_next_file() in tcpdump.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760457
[ 19 ] Bug #1760455 - CVE-2018-14462 tcpdump: Buffer over-read in
icmp_print() function in print-icmp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760455
[ 20 ] Bug #1760453 - CVE-2018-14463 tcpdump: Buffer over-read in
vrrp_print() function in print-vrrp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760453
[ 21 ] Bug #1760449 - CVE-2018-14465 tcpdump: Buffer over-read in
rsvp_obj_print() function in print-rsvp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760449
[ 22 ] Bug #1760447 - CVE-2018-14469 tcpdump: Buffer over-read in
ikev1_n_print() function in print-isakmp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760447
[ 23 ] Bug #1760445 - CVE-2018-16300 tcpdump: Resource exhaustion in
bgp_attr_print() function in print-bgp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1760445
[ 24 ] Bug #1735549 - CVE-2019-1010220 tcpdump: buffer over-read in function
print_prefix in print-hncp.c
https://bugzilla.redhat.com/show_bug.cgi?id=1735549
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-85d92df70f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung