Your message dated Mon, 04 Sep 2017 18:23:02 +0000
with message-id <[email protected]>
and subject line Bug#873806: fixed in tcpdump 4.9.1-3
has caused the Debian Bug report #873806,
regarding CVE-2017-11543
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
873806: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873806
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: tcpdump
X-Debbugs-CC: [email protected] 
[email protected]
Severity: important
Tags: security

Hi,

the following vulnerability was published for tcpdump.

CVE-2017-11541[0]:
| tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print
| function in print-lldp.c, related to util-print.c.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-11541
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541

Please adjust the affected versions in the BTS as needed.

Note that I've not been able to reproduce the vulnerability with the
pcap file provided at

    
https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl

but given this has a CVE I figured it's safer to bring this to your
attention anyway.

--- End Message ---
--- Begin Message ---
Source: tcpdump
Source-Version: 4.9.1-3

We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Francoise <[email protected]> (supplier of updated tcpdump package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 04 Sep 2017 19:45:45 +0200
Source: tcpdump
Binary: tcpdump
Architecture: source
Version: 4.9.1-3
Distribution: unstable
Urgency: high
Maintainer: Romain Francoise <[email protected]>
Changed-By: Romain Francoise <[email protected]>
Description:
 tcpdump    - command-line network traffic analyzer
Closes: 873804 873805 873806
Changes:
 tcpdump (4.9.1-3) unstable; urgency=high
 .
   * Cherry-pick three upstream commits to fix the following:
     + CVE-2017-11541: buffer over-read in safeputs() (closes: #873804)
     + CVE-2017-11542: buffer over-read in pimv1_print() (closes: #873805)
     + CVE-2017-11543: buffer overflow in sliplink_print() (closes: #873806)
   * Urgency high due to security fixes.
Checksums-Sha1:
 d7efac898d514d8240d9044d573be5ad04206886 2182 tcpdump_4.9.1-3.dsc
 4507deca7823f93c8c8bc4994557156b220a2e8a 16208 tcpdump_4.9.1-3.debian.tar.xz
 0f23ae4e6708735a48564b876ebce39f9ff370fe 5229 tcpdump_4.9.1-3_source.buildinfo
Checksums-Sha256:
 230668ace3ae470e2c9fbd15abe299331621edaf1549c4c416783d8aeccaef00 2182 
tcpdump_4.9.1-3.dsc
 ba185ef50e0314d779f4f94267543c961a92a5cd8418954e17908d2182f17633 16208 
tcpdump_4.9.1-3.debian.tar.xz
 8c963e57e37015a0c75fe466d1caecb3372fccdb03375fc2ac27717d59c976e4 5229 
tcpdump_4.9.1-3_source.buildinfo
Files:
 c45ed5fe41bf9832caeed10cdcb0008e 2182 net optional tcpdump_4.9.1-3.dsc
 3e00bdf8265683741983c85fc413acb9 16208 net optional 
tcpdump_4.9.1-3.debian.tar.xz
 c74963091004bd9eb5b00f2c7f0334d4 5229 net optional 
tcpdump_4.9.1-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEvjSXQsqYfs1+d+QtrRX0NfBfli0FAlmtk4MACgkQrRX0NfBf
li3LPhAAkccFjICqg4rDDez4IWClauSEwPb2Y3pGfgFuF/i/r5GHNqZK00MIEmjq
QK2Rbr53HkTYdUbW3cOOH1SQNH228I6ecfhFrX04VcgK0bf/0bBHjbHICGE1Sw1j
8oh39yOcePFBxT2m0rYwmp+BDF6Wazj1WOIo1Bwe5dr3oAangV2yYQ1l6GXJn69S
HD2ICedzUccXtmpT0qB1nM/HJX3Y2AW9VF5vTx0LlyurSu34sZ5u750pNpzjAykT
cvxve1McVVyKC+CF+VkR7vIdiarGB+xjpd0jz6n1tDXYjukG5w0CrcEoo2dI5PMp
ORrcY0xQTaj8H1HmZohyNLiSQezr+do4j5OXA/f+4haAzsdIbyeagYeDXVE+4DFx
+gtbIlcbB+3Zp/WrVnrH8jMZuEk6RLC+mAC75yw58EV3wcAJya5yjK9k0/7Vra/e
vpAh4QDkuYsqrHtsbNI2e2fVdGPG8h1+9XBptGQbA1m48DCv1PtEFQuCfTxPv/Pm
dSyeT/mIkylF3xb4oA3qqpi2c3KhQnBxb2kULsx56fmmFgUOpsIe2obnp1YJBV3G
CnKhN5J0HaPXJwD7lrzv702r8UBLZ1pLEjy/NquQB56e6UO7Q1oSnVsMkUD7IWtX
cwX3WZJujppDdifR9i2FmqlJOqTfdyo8B0PJMWeptAC/YaSnjM0=
=6ge5
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to