Bug#1034086: tcpdump: CVE-2023-1801
Consequently I'm going to mark this bug as fixed in 4.9.3-1, which was the first version to disable the SMB code in Debian (in 2019). -- Romain Francoise https://people.debian.org/~rfrancoise/
Bug#1034086: tcpdump: CVE-2023-1801
Hi Romain, On Sat, Apr 08, 2023 at 09:49:05PM +0200, Romain Francoise wrote: > Hi Salvatore, > > On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso wrote: > > The following vulnerability was published for tcpdump. > > > > CVE-2023-1801[0]: > > | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out- > > | of-bounds write when decoding a crafted network packet. > > Thanks. Just in case, I will mention that the SMB printer code is > *not* enabled in Debian anymore. None of the supported distributions > (oldstable, stable, testing/sid) are affected. Ah right, I see the binary packages are not affected by the respective code path, so have marked this in the security-tracker accordingly as unimportant. Thanks, Regards, Salvatore
Bug#1034086: tcpdump: CVE-2023-1801
Hi Salvatore, On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso wrote: > The following vulnerability was published for tcpdump. > > CVE-2023-1801[0]: > | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out- > | of-bounds write when decoding a crafted network packet. Thanks. Just in case, I will mention that the SMB printer code is *not* enabled in Debian anymore. None of the supported distributions (oldstable, stable, testing/sid) are affected. -- Romain Francoise https://people.debian.org/~rfrancoise/
Bug#1034086: tcpdump: CVE-2023-1801
Source: tcpdump Version: 4.99.3-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for tcpdump. CVE-2023-1801[0]: | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out- | of-bounds write when decoding a crafted network packet. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-1801 https://www.cve.org/CVERecord?id=CVE-2023-1801 [1] https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc Regards, Salvatore