Updated tcpdump packages fix security vulnerabilities
Publication date: 10 Sep 2017Modification date: 10 Sep 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-11543 , CVE-2017-13011 , CVE-2017-12989 , CVE-2017-12990 , CVE-2017-12995 , CVE-2017-12997 , CVE-2017-11541 , CVE-2017-11542 , CVE-2017-12893 , CVE-2017-12894 , CVE-2017-12895 , CVE-2017-12896 , CVE-2017-12897 , CVE-2017-12898 , CVE-2017-12899 , CVE-2017-12900 , CVE-2017-12901 , CVE-2017-12902 , CVE-2017-12985 , CVE-2017-12986 , CVE-2017-12987 , CVE-2017-12988 , CVE-2017-12991 , CVE-2017-12992 , CVE-2017-12993 , CVE-2017-11542 , CVE-2017-11541 , CVE-2017-12994 , CVE-2017-12996 , CVE-2017-12998 , CVE-2017-12999 , CVE-2017-13000 , CVE-2017-13001 , CVE-2017-13002 , CVE-2017-13003 , CVE-2017-13004 , CVE-2017-13005 , CVE-2017-13006 , CVE-2017-13007 , CVE-2017-13008 , CVE-2017-13009 , CVE-2017-13010 , CVE-2017-13012 , CVE-2017-13013 , CVE-2017-13014 , CVE-2017-13015 , CVE-2017-11543 , CVE-2017-13016 , CVE-2017-13017 , CVE-2017-13018 , CVE-2017-13019 , CVE-2017-13020 , CVE-2017-13021 , CVE-2017-13022 , CVE-2017-13023 , CVE-2017-13024 , CVE-2017-13025 , CVE-2017-13026 , CVE-2017-13027 , CVE-2017-13028 , CVE-2017-13029 , CVE-2017-13030 , CVE-2017-13031 , CVE-2017-13032 , CVE-2017-13033 , CVE-2017-13034 , CVE-2017-13035 , CVE-2017-13036 , CVE-2017-13037 , CVE-2017-13038 , CVE-2017-13039 , CVE-2017-13040 , CVE-2017-13041 , CVE-2017-13042 , CVE-2017-13043 , CVE-2017-13044 , CVE-2017-13045 , CVE-2017-13046 , CVE-2017-13047 , CVE-2017-13048 , CVE-2017-13049 , CVE-2017-13050 , CVE-2017-13051 , CVE-2017-13052 , CVE-2017-13053 , CVE-2017-13054 , CVE-2017-13055 , CVE-2017-13687 , CVE-2017-13688 , CVE-2017-13689 , CVE-2017-13690 , CVE-2017-13725
Description
Summary for 4.9.2 tcpdump release Do not use getprotobynumber() for protocol name resolution. Do not do any protocol name resolution if -n is specified. Improve errors detection in the test scripts. Fix a segfault with OpenSSL 1.1 and improve OpenSSL usage. Clean up IS-IS printing. Fix buffer overflow vulnerabilities: CVE-2017-11543 (SLIP), CVE-2017-13011 (bittok2str_internal) Fix infinite loop vulnerabilities: CVE-2017-12989 (RESP), CVE-2017-12990 (ISAKMP), CVE-2017-12995 (DNS), CVE-2017-12997 (LLDP). Fix buffer over-read vulnerabilities: CVE-2017-11541 (safeputs), CVE-2017-11542 (PIMv1), CVE-2017-12893 (SMB/CIFS), CVE-2017-12894 (lookup_bytestring), CVE-2017-12895 (ICMP), CVE-2017-12896 (ISAKMP), CVE-2017-12897 (ISO CLNS), CVE-2017-12898 (NFS), CVE-2017-12899 (DECnet), CVE-2017-12900 (tok2strbuf), CVE-2017-12901 (EIGRP), CVE-2017-12902 (Zephyr), CVE-2017-12985 (IPv6), CVE-2017-12986 (IPv6 routing headers), CVE-2017-12987 (IEEE 802.11), CVE-2017-12988 (telnet), CVE-2017-12991 (BGP), CVE-2017-12992 (RIPng), CVE-2017-12993 (Juniper), CVE-2017-11542 (PIMv1), CVE-2017-11541 (safeputs), CVE-2017-12994 (BGP), CVE-2017-12996 (PIMv2), CVE-2017-12998 (ISO IS-IS), CVE-2017-12999 (ISO IS-IS), CVE-2017-13000 (IEEE 802.15.4), CVE-2017-13001 (NFS), CVE-2017-13002 (AODV), CVE-2017-13003 (LMP), CVE-2017-13004 (Juniper), CVE-2017-13005 (NFS), CVE-2017-13006 (L2TP), CVE-2017-13007 (Apple PKTAP), CVE-2017-13008 (IEEE 802.11), CVE-2017-13009 (IPv6 mobility), CVE-2017-13010 (BEEP), CVE-2017-13012 (ICMP), CVE-2017-13013 (ARP), CVE-2017-13014 (White Board), CVE-2017-13015 (EAP), CVE-2017-11543 (SLIP), CVE-2017-13016 (ISO ES-IS), CVE-2017-13017 (DHCPv6), CVE-2017-13018 (PGM), CVE-2017-13019 (PGM), CVE-2017-13020 (VTP), CVE-2017-13021 (ICMPv6), CVE-2017-13022 (IP), CVE-2017-13023 (IPv6 mobility), CVE-2017-13024 (IPv6 mobility), CVE-2017-13025 (IPv6 mobility), CVE-2017-13026 (ISO IS-IS), CVE-2017-13027 (LLDP), CVE-2017-13028 (BOOTP), CVE-2017-13029 (PPP), CVE-2017-13030 (PIM), CVE-2017-13031 (IPv6 fragmentation header), CVE-2017-13032 (RADIUS), CVE-2017-13033 (VTP), CVE-2017-13034 (PGM), CVE-2017-13035 (ISO IS-IS), CVE-2017-13036 (OSPFv3), CVE-2017-13037 (IP), CVE-2017-13038 (PPP), CVE-2017-13039 (ISAKMP), CVE-2017-13040 (MPTCP), CVE-2017-13041 (ICMPv6), CVE-2017-13042 (HNCP), CVE-2017-13043 (BGP), CVE-2017-13044 (HNCP), CVE-2017-13045 (VQP), CVE-2017-13046 (BGP), CVE-2017-13047 (ISO ES-IS), CVE-2017-13048 (RSVP), CVE-2017-13049 (Rx), CVE-2017-13050 (RPKI-Router), CVE-2017-13051 (RSVP), CVE-2017-13052 (CFM), CVE-2017-13053 (BGP), CVE-2017-13054 (LLDP), CVE-2017-13055 (ISO IS-IS), CVE-2017-13687 (Cisco HDLC), CVE-2017-13688 (OLSR), CVE-2017-13689 (IKEv1), CVE-2017-13690 (IKEv2), CVE-2017-13725 (IPv6 routing headers)
References
- https://bugs.mageia.org/show_bug.cgi?id=21664
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12989
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12997
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12893
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12894
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12895
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12896
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12898
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12899
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12900
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12901
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12902
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12985
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12986
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12987
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12991
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12992
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12996
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12998
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12999
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13000
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13001
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13002
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13003
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13004
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13005
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13007
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13009
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13012
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13013
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13014
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13029
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13045
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13725
SRPMS
6/core
- tcpdump-4.9.2-1.mga6
5/core
- tcpdump-4.9.2-1.mga5