Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2087-1

Опубликовано: 07 авг. 2019
Источник: suse-cvrf

Описание

Security update for tcpdump

This update for tcpdump fixes the following issues:

Security issues fixed:

  • CVE-2019-1010220: Fixed a buffer over-read in print_prefix() which may expose data (bsc#1142439).
  • CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print() and lookup_emem() (bsc#1068716).

Список пакетов

Container suse/sle-micro/5.0/toolbox:latest
tcpdump-4.9.2-3.6.1
Container suse/sle-micro/5.1/toolbox:latest
tcpdump-4.9.2-3.6.1
Container suse/sle-micro/5.2/toolbox:latest
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-BYOS-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-BYOS-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-BYOS-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-CHOST-BYOS-Aliyun
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-CHOST-BYOS-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-CHOST-BYOS-EC2
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-CHOST-BYOS-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-EC2-ECS-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-HPC-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-HPC-BYOS-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-HPC-BYOS-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-HPC-BYOS-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-BYOS-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-BYOS-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-BYOS-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAP-GCE
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAPCAL-Azure
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAPCAL-EC2-HVM
tcpdump-4.9.2-3.6.1
Image SLES15-SP3-SAPCAL-GCE
tcpdump-4.9.2-3.6.1
SUSE Linux Enterprise Module for Basesystem 15
tcpdump-4.9.2-3.6.1
SUSE Linux Enterprise Module for Basesystem 15 SP1
tcpdump-4.9.2-3.6.1

Описание

tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.


Затронутые продукты
Container suse/sle-micro/5.0/toolbox:latest:tcpdump-4.9.2-3.6.1
Container suse/sle-micro/5.1/toolbox:latest:tcpdump-4.9.2-3.6.1
Container suse/sle-micro/5.2/toolbox:latest:tcpdump-4.9.2-3.6.1
Image SLES15-SP3-BYOS-Azure:tcpdump-4.9.2-3.6.1

Ссылки

Описание

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.


Затронутые продукты
Container suse/sle-micro/5.0/toolbox:latest:tcpdump-4.9.2-3.6.1
Container suse/sle-micro/5.1/toolbox:latest:tcpdump-4.9.2-3.6.1
Container suse/sle-micro/5.2/toolbox:latest:tcpdump-4.9.2-3.6.1
Image SLES15-SP3-BYOS-Azure:tcpdump-4.9.2-3.6.1

Ссылки
Уязвимость SUSE-SU-2019:2087-1