Bug 922222 (CVE-2015-2154) - VUL-0: CVE-2015-2154: tcpdump: [issue with ethernet printer]
Summary: VUL-0: CVE-2015-2154: tcpdump: [issue with ethernet printer]
Status: RESOLVED FIXED
Alias: CVE-2015-2154
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-03-27
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/114717/
Whiteboard: maint:released:sle10-sp3:61240 maint:...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-13 09:36 UTC by Andreas Stieger
Modified: 2017-05-08 16:13 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-03-13 09:36:34 UTC
via oss-sec:

tcpdump 4.7.2 contains a fix for
           CVE-2015-2154 --- issue with ethernet printer.

A patch for tcpdump 4.3 is at:
    http://www.ca.tcpdump.org/cve/
0001-in-some-cases-we-expect-tcpdump-to-fail-with-an-erro.patch
0002-test-case-files-for-CVE-2015-2153-2154-2155.patch

If you require patches for other versions, please let us know.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2155
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-2155.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155
Comment 1 Swamp Workflow Management 2015-03-13 09:46:57 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-03-27.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/61100
Comment 2 Swamp Workflow Management 2015-03-13 23:00:41 UTC
bugbot adjusting priority
Comment 3 Bernhard Wiedemann 2015-03-20 12:00:17 UTC
This is an autogenerated message for OBS integration:
This bug (922222) was mentioned in
https://build.opensuse.org/request/show/292023 13.2+13.1 / tcpdump
Comment 10 Swamp Workflow Management 2015-03-27 15:05:22 UTC
openSUSE-SU-2015:0616-1: An update that fixes 5 vulnerabilities is now available.

Category: security (moderate)
Bug References: 922220,922221,922222,922223,923142
CVE References: CVE-2014-9140,CVE-2015-0261,CVE-2015-2153,CVE-2015-2154,CVE-2015-2155
Sources used:
openSUSE 13.2 (src):    tcpdump-4.6.2-8.1
openSUSE 13.1 (src):    tcpdump-4.4.0-2.8.1
Comment 11 Swamp Workflow Management 2015-04-08 13:05:24 UTC
SUSE-SU-2015:0679-1: An update that fixes 5 vulnerabilities is now available.

Category: security (moderate)
Bug References: 922220,922221,922222,922223,923142
CVE References: CVE-2014-9140,CVE-2015-0261,CVE-2015-2153,CVE-2015-2154,CVE-2015-2155
Sources used:
SUSE Linux Enterprise Server 12 (src):    tcpdump-4.5.1-7.1
SUSE Linux Enterprise Desktop 12 (src):    tcpdump-4.5.1-7.1
Comment 12 Andreas Stieger 2015-04-08 14:53:28 UTC
releasing
Comment 13 Swamp Workflow Management 2015-04-09 01:06:58 UTC
SUSE-SU-2015:0692-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 922220,922222,923142
CVE References: CVE-2014-9140,CVE-2015-0261,CVE-2015-2154
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3 (src):    tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    tcpdump-3.9.8-1.27.1
Comment 14 Swamp Workflow Management 2017-04-26 19:10:03 UTC
SUSE-SU-2017:1110-1: An update that fixes 49 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1020940,1035686,905870,905871,905872,922220,922221,922222,922223,927637
CVE References: CVE-2014-8767,CVE-2014-8768,CVE-2014-8769,CVE-2015-0261,CVE-2015-2153,CVE-2015-2154,CVE-2015-2155,CVE-2015-3138,CVE-2016-7922,CVE-2016-7923,CVE-2016-7924,CVE-2016-7925,CVE-2016-7926,CVE-2016-7927,CVE-2016-7928,CVE-2016-7929,CVE-2016-7930,CVE-2016-7931,CVE-2016-7932,CVE-2016-7933,CVE-2016-7934,CVE-2016-7935,CVE-2016-7936,CVE-2016-7937,CVE-2016-7938,CVE-2016-7939,CVE-2016-7940,CVE-2016-7973,CVE-2016-7974,CVE-2016-7975,CVE-2016-7983,CVE-2016-7984,CVE-2016-7985,CVE-2016-7986,CVE-2016-7992,CVE-2016-7993,CVE-2016-8574,CVE-2016-8575,CVE-2017-5202,CVE-2017-5203,CVE-2017-5204,CVE-2017-5205,CVE-2017-5341,CVE-2017-5342,CVE-2017-5482,CVE-2017-5483,CVE-2017-5484,CVE-2017-5485,CVE-2017-5486
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP2 (src):    libpcap-1.8.1-9.1
SUSE Linux Enterprise Workstation Extension 12-SP1 (src):    libpcap-1.8.1-9.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    libpcap-1.8.1-9.1
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    libpcap-1.8.1-9.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    libpcap-1.8.1-9.1, tcpdump-4.9.0-13.1
SUSE Linux Enterprise Server 12-SP2 (src):    libpcap-1.8.1-9.1, tcpdump-4.9.0-13.1
SUSE Linux Enterprise Server 12-SP1 (src):    libpcap-1.8.1-9.1, tcpdump-4.9.0-13.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    libpcap-1.8.1-9.1, tcpdump-4.9.0-13.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    libpcap-1.8.1-9.1, tcpdump-4.9.0-13.1
Comment 15 Swamp Workflow Management 2017-05-08 16:13:40 UTC
openSUSE-SU-2017:1199-1: An update that fixes 49 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1020940,1035686,905870,905871,905872,922220,922221,922222,922223,927637
CVE References: CVE-2014-8767,CVE-2014-8768,CVE-2014-8769,CVE-2015-0261,CVE-2015-2153,CVE-2015-2154,CVE-2015-2155,CVE-2015-3138,CVE-2016-7922,CVE-2016-7923,CVE-2016-7924,CVE-2016-7925,CVE-2016-7926,CVE-2016-7927,CVE-2016-7928,CVE-2016-7929,CVE-2016-7930,CVE-2016-7931,CVE-2016-7932,CVE-2016-7933,CVE-2016-7934,CVE-2016-7935,CVE-2016-7936,CVE-2016-7937,CVE-2016-7938,CVE-2016-7939,CVE-2016-7940,CVE-2016-7973,CVE-2016-7974,CVE-2016-7975,CVE-2016-7983,CVE-2016-7984,CVE-2016-7985,CVE-2016-7986,CVE-2016-7992,CVE-2016-7993,CVE-2016-8574,CVE-2016-8575,CVE-2017-5202,CVE-2017-5203,CVE-2017-5204,CVE-2017-5205,CVE-2017-5341,CVE-2017-5342,CVE-2017-5482,CVE-2017-5483,CVE-2017-5484,CVE-2017-5485,CVE-2017-5486
Sources used:
openSUSE Leap 42.2 (src):    libpcap-1.8.1-7.3.1, tcpdump-4.9.0-6.3.1
openSUSE Leap 42.1 (src):    libpcap-1.8.1-8.1, tcpdump-4.9.0-7.1