SUSE-SU-2017:2690-1

Source
https://www.suse.com/support/update/announcement/2017/suse-su-20172690-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:2690-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2017:2690-1
Related
Published
2017-10-10T09:45:19Z
Modified
2017-10-10T09:45:19Z
Summary
Security update for tcpdump
Details

This update for tcpdump fixes the following issues:

Security issues fixed:

  • CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
  • CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c (bsc#1057247).
  • CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print function in print-pim.c (bsc#1057247).
  • CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function in print-sl.c (bsc#1057247).
  • CVE-2017-13011: Several protocol parsers in tcpdump could have caused a buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).
References

Affected packages

SUSE:Linux Enterprise Server 11 SP4 / tcpdump

Package

Name
tcpdump
Purl
pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.8-1.30.5.1

Ecosystem specific

{
    "binaries": [
        {
            "tcpdump": "3.9.8-1.30.5.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / tcpdump

Package

Name
tcpdump
Purl
pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.8-1.30.5.1

Ecosystem specific

{
    "binaries": [
        {
            "tcpdump": "3.9.8-1.30.5.1"
        }
    ]
}