Security update for tcpdump

SUSE Security Update: Security update for tcpdump
Announcement ID: SUSE-SU-2017:2690-1
Rating: moderate
References: #1047873 #1057247
Affected Products:
  • SUSE Linux Enterprise Server 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

  • An update that fixes 5 vulnerabilities is now available.

    Description:

    This update for tcpdump fixes the following issues:

    Security issues fixed:

    - CVE-2017-11108: Crafted input allowed remote DoS (bsc#1047873)
    - CVE-2017-11541: Prevent a heap-based buffer over-read in the lldp_print
    function in print-lldp.c, related to util-print.c (bsc#1057247).
    - CVE-2017-11542: Prevent a heap-based buffer over-read in the pimv1_print
    function in print-pim.c (bsc#1057247).
    - CVE-2017-11543: Prevent a buffer overflow in the sliplink_print function
    in print-sl.c (bsc#1057247).
    - CVE-2017-13011: Several protocol parsers in tcpdump could have caused a
    buffer overflow in util-print.c:bittok2str_internal() (bsc#1057247).

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-tcpdump-13305=1
    • SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-tcpdump-13305=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • tcpdump-3.9.8-1.30.5.1
    • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • tcpdump-debuginfo-3.9.8-1.30.5.1
      • tcpdump-debugsource-3.9.8-1.30.5.1

    References: