Updated libpcap/tcpdump packages fix security vulnerability
Publication date: 23 Feb 2017Modification date: 23 Feb 2017
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-7922 , CVE-2016-7923 , CVE-2016-7924 , CVE-2016-7925 , CVE-2016-7926 , CVE-2016-7927 , CVE-2016-7928 , CVE-2016-7929 , CVE-2016-7930 , CVE-2016-7931 , CVE-2016-7932 , CVE-2016-7933 , CVE-2016-7934 , CVE-2016-7935 , CVE-2016-7936 , CVE-2016-7937 , CVE-2016-7938 , CVE-2016-7939 , CVE-2016-7940 , CVE-2016-7973 , CVE-2016-7974 , CVE-2016-7975 , CVE-2016-7983 , CVE-2016-7984 , CVE-2016-7985 , CVE-2016-7986 , CVE-2016-7992 , CVE-2016-7993 , CVE-2016-8574 , CVE-2016-8575 , CVE-2017-5202 , CVE-2017-5203 , CVE-2017-5204 , CVE-2017-5205 , CVE-2017-5341 , CVE-2017-5342 , CVE-2017-5482 , CVE-2017-5483 , CVE-2017-5484 , CVE-2017-5485 , CVE-2017-5486
Description
The AH parser in tcpdump before 4.9.0 has a buffer overflow in
print-ah.c:ah_print(). (CVE-2016-7922)
The ARP parser in tcpdump before 4.9.0 has a buffer overflow in
print-arp.c:arp_print(). (CVE-2016-7923)
The ATM parser in tcpdump before 4.9.0 has a buffer overflow in
print-atm.c:oam_print(). (CVE-2016-7924)
The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow
in print-sl.c:sl_if_print(). (CVE-2016-7925)
The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in
print-ether.c:ethertype_print(). (CVE-2016-7926)
The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in
print-802_11.c:ieee802_11_radio_print(). (CVE-2016-7927)
The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in
print-ipcomp.c:ipcomp_print(). (CVE-2016-7928)
The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow
in print-juniper.c:juniper_parse_header(). (CVE-2016-7929)
The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in
print-llc.c:llc_print(). (CVE-2016-7930)
The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in
print-mpls.c:mpls_print(). (CVE-2016-7931)
The PIM parser in tcpdump before 4.9.0 has a buffer overflow in
print-pim.c:pimv2_check_checksum(). (CVE-2016-7932)
The PPP parser in tcpdump before 4.9.0 has a buffer overflow in
print-ppp.c:ppp_hdlc_if_print(). (CVE-2016-7933)
The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in
print-udp.c:rtcp_print(). (CVE-2016-7934)
The RTP parser in tcpdump before 4.9.0 has a buffer overflow in
print-udp.c:rtp_print(). (CVE-2016-7935)
The UDP parser in tcpdump before 4.9.0 has a buffer overflow in
print-udp.c:udp_print(). (CVE-2016-7936)
The VAT parser in tcpdump before 4.9.0 has a buffer overflow in
print-udp.c:vat_print(). (CVE-2016-7937)
The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in
print-zeromq.c:zmtp1_print_frame(). (CVE-2016-7938)
The GRE parser in tcpdump before 4.9.0 has a buffer overflow in
print-gre.c, multiple functions. (CVE-2016-7939)
The STP parser in tcpdump before 4.9.0 has a buffer overflow in
print-stp.c, multiple functions. (CVE-2016-7940)
The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in
print-atalk.c, multiple functions. (CVE-2016-7973)
The IP parser in tcpdump before 4.9.0 has a buffer overflow in
print-ip.c, multiple functions. (CVE-2016-7974)
The TCP parser in tcpdump before 4.9.0 has a buffer overflow in
print-tcp.c:tcp_print(). (CVE-2016-7975)
The BOOTP parser in tcpdump before 4.9.0 has buffer overflows in
print-bootp.c:bootp_print(). (CVE-2016-7983 and CVE-2017-5203)
The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in
print-tftp.c:tftp_print(). (CVE-2016-7984)
The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in
print-calm-fast.c:calm_fast_print(). (CVE-2016-7985)
The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in
print-geonet.c, multiple functions. (CVE-2016-7986)
The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer
overflow in print-cip.c:cip_if_print(). (CVE-2016-7992)
A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a
buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
lightweight resolver protocol, PIM). (CVE-2016-7993)
The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in
print-fr.c:frf15_print(). (CVE-2016-8574)
The Q.933 parser in tcpdump before 4.9.0 has buffer overflows in
print-fr.c:q933_print(). (CVE-2016-8575 and CVE-2017-5482)
The ISO CLNS parser in tcpdump before 4.9.0 has buffer overflows in
print-isoclns.c:clnp_print(). (CVE-2017-5202 and CVE-2017-5486)
The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in
print-ip6.c:ip6_print(). (CVE-2017-5204)
The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in
print-isakmp.c:ikev2_e_print(). (CVE-2017-5205)
The OTV parser in tcpdump before 4.9.0 has a buffer overflow in
print-otv.c:otv_print(). (CVE-2017-5341)
In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE,
NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
print-ether.c:ether_print(). (CVE-2017-5342)
The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in
print-snmp.c:asn1_parse(). (CVE-2017-5483)
The ATM parser in tcpdump before 4.9.0 has a buffer overflow in
print-atm.c:sig_print(). (CVE-2017-5484)
The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in
addrtoname.c:lookup_nsap(). (CVE-2017-5485)
References
- https://bugs.mageia.org/show_bug.cgi?id=20212
- https://www.debian.org/security/2017/dsa-3775
- http://openwall.com/lists/oss-security/2017/01/30/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486
SRPMS
5/core
- libpcap-1.8.1-1.mga5
- tcpdump-4.9.0-1.mga5