openSUSE: 2019:2344-1: important: tcpdump
Description
This update for tcpdump fixes the following issues: - CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print and lookup_emem (bsc#1068716 bsc#1153098). - CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098). - CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098). - CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098). - CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098). - CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098). - CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098). - CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098). - CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098). - CVE-2018-14467: Fixed a buffer over-read in pri...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-2344=1
Package List
- openSUSE Leap 15.0 (x86_64): tcpdump-4.9.2-lp150.10.1 tcpdump-debuginfo-4.9.2-lp150.10.1 tcpdump-debugsource-4.9.2-lp150.10.1
References
https://www.suse.com/security/cve/CVE-2017-16808.html https://www.suse.com/security/cve/CVE-2018-10103.html https://www.suse.com/security/cve/CVE-2018-10105.html https://www.suse.com/security/cve/CVE-2018-14461.html https://www.suse.com/security/cve/CVE-2018-14462.html https://www.suse.com/security/cve/CVE-2018-14463.html https://www.suse.com/security/cve/CVE-2018-14464.html https://www.suse.com/security/cve/CVE-2018-14465.html https://www.suse.com/security/cve/CVE-2018-14466.html https://www.suse.com/security/cve/CVE-2018-14467.html https://www.suse.com/security/cve/CVE-2018-14468.html https://www.suse.com/security/cve/CVE-2018-14469.html https://www.suse.com/security/cve/CVE-2018-14470.html https://www.suse.com/security/cve/CVE-2018-14879.html https://www.suse.com/security/cve/CVE-2018-14880.html https://www.suse.com/security/cve/CVE-2018-14881.html https://www.suse.com/security/cve/CVE-2018-14882.html https://www.suse.com/security/cve/CVE-2018-16227.html https://www.suse.com/security/cve/CVE-2018-16228.html https://www.suse.com/security/cve/CVE-2018-16229.html https://www.suse.com/security/cve/CVE-2018-16230.html https://www.suse.com/security/cve/CVE-2018-16300.html https://www.suse.com/security/cve/CVE-2018-16301.html https://www.suse.com/security/cve/CVE-2018-16451.html https://www.suse.com/security/cve/CVE-2018-16452.html https://www.suse.com/security/cve/CVE-2019-1010220.html https://www.suse.com/security/cve/CVE-2019-15166.html https://www.suse.com/security/cve/CVE-2019-15167.html https://bugzilla.suse.com/1068716 https://bugzilla.suse.com/1153098 https://bugzilla.suse.com/1153332--