Security update for tcpdump

SUSE Security Update: Security update for tcpdump
Announcement ID: SUSE-SU-2015:0679-1
Rating: moderate
References: #922220 #922221 #922222 #922223 #923142
Affected Products:
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Desktop 12

  • An update that fixes 5 vulnerabilities is now available.

    Description:

    tcpdump was updated to fix five vulnerabilities in protocol printers

    When running tcpdump, a remote unauthenticated user could have crashed the
    application or, potentially, execute arbitrary code by injecting crafted
    packages into the network.

    The following vulnerabilities were fixed:
    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)
    * force printer remote DoS (CVE-2015-2155, bnc#922223)
    * ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * tcp printer remote DoS (CVE-2015-2153, bnc#922221)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2015-159=1
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-159=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
      • tcpdump-4.5.1-7.1
      • tcpdump-debuginfo-4.5.1-7.1
      • tcpdump-debugsource-4.5.1-7.1
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • tcpdump-4.5.1-7.1
      • tcpdump-debuginfo-4.5.1-7.1
      • tcpdump-debugsource-4.5.1-7.1

    References:

    • https://www.suse.com/security/cve/CVE-2014-9140.html
    • https://www.suse.com/security/cve/CVE-2015-0261.html
    • https://www.suse.com/security/cve/CVE-2015-2153.html
    • https://www.suse.com/security/cve/CVE-2015-2154.html
    • https://www.suse.com/security/cve/CVE-2015-2155.html
    • https://bugzilla.suse.com/922220
    • https://bugzilla.suse.com/922221
    • https://bugzilla.suse.com/922222
    • https://bugzilla.suse.com/922223
    • https://bugzilla.suse.com/923142