Security update for tcpdump

Announcement ID: SUSE-SU-2014:1723-1
Rating: moderate
References:
Cross-References:
CVSS scores:
Affected Products:
  • SUSE Linux Enterprise Desktop 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server for SAP Applications 12

An update that solves three vulnerabilities can now be installed.

Description:

This tcpdump update fixes the following security issues:

  • fix CVE-2014-8767 (bnc#905870)
  • denial of service in verbose mode using malformed OLSR payload
  • fix CVE-2014-8768 (bnc#905871)
  • denial of service in verbose mode using malformed Geonet payload
  • fix CVE-2014-8769 (bnc#905872)
  • unreliable output using malformed AOVD payload

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Desktop 12
    zypper in -t patch SUSE-SLE-DESKTOP-12-2014-122=1
  • SUSE Linux Enterprise Server 12
    zypper in -t patch SUSE-SLE-SERVER-12-2014-122=1
  • SUSE Linux Enterprise Server for SAP Applications 12
    zypper in -t patch SUSE-SLE-SERVER-12-2014-122=1

Package List:

  • SUSE Linux Enterprise Desktop 12 (x86_64)
    • tcpdump-debuginfo-4.5.1-4.1
    • tcpdump-debugsource-4.5.1-4.1
    • tcpdump-4.5.1-4.1
  • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64)
    • tcpdump-debuginfo-4.5.1-4.1
    • tcpdump-debugsource-4.5.1-4.1
    • tcpdump-4.5.1-4.1
  • SUSE Linux Enterprise Server for SAP Applications 12 (x86_64)
    • tcpdump-debuginfo-4.5.1-4.1
    • tcpdump-debugsource-4.5.1-4.1
    • tcpdump-4.5.1-4.1

References: