Security update for tcpdump

SUSE Security Update: Security update for tcpdump
Announcement ID: SUSE-SU-2014:1723-1
Rating: moderate
References: #905870 #905871 #905872
Affected Products:
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Desktop 12

  • An update that fixes three vulnerabilities is now available.

    Description:

    This tcpdump update fixes the following security issues:

    - fix CVE-2014-8767 (bnc#905870)
    * denial of service in verbose mode using malformed OLSR payload
    - fix CVE-2014-8768 (bnc#905871)
    * denial of service in verbose mode using malformed Geonet payload
    - fix CVE-2014-8769 (bnc#905872)
    * unreliable output using malformed AOVD payload

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2014-122
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2014-122

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
      • tcpdump-4.5.1-4.1
      • tcpdump-debuginfo-4.5.1-4.1
      • tcpdump-debugsource-4.5.1-4.1
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • tcpdump-4.5.1-4.1
      • tcpdump-debuginfo-4.5.1-4.1
      • tcpdump-debugsource-4.5.1-4.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-8767.html
    • http://support.novell.com/security/cve/CVE-2014-8768.html
    • http://support.novell.com/security/cve/CVE-2014-8769.html
    • https://bugzilla.suse.com/show_bug.cgi?id=905870
    • https://bugzilla.suse.com/show_bug.cgi?id=905871
    • https://bugzilla.suse.com/show_bug.cgi?id=905872