Bug#1034086: tcpdump: CVE-2023-1801

2023-04-10 Thread Romain Francoise
Consequently I'm going to mark this bug as fixed in 4.9.3-1, which was
the first version to disable the SMB code in Debian (in 2019).

-- 
Romain Francoise 
https://people.debian.org/~rfrancoise/



Bug#1034086: tcpdump: CVE-2023-1801

2023-04-09 Thread Salvatore Bonaccorso
Hi Romain,

On Sat, Apr 08, 2023 at 09:49:05PM +0200, Romain Francoise wrote:
> Hi Salvatore,
> 
> On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso  wrote:
> > The following vulnerability was published for tcpdump.
> >
> > CVE-2023-1801[0]:
> > | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
> > | of-bounds write when decoding a crafted network packet.
> 
> Thanks. Just in case, I will mention that the SMB printer code is
> *not* enabled in Debian anymore. None of the supported distributions
> (oldstable, stable, testing/sid) are affected.

Ah right, I see the binary packages are not affected by the respective
code path, so have marked this in the security-tracker accordingly as
unimportant.

Thanks,

Regards,
Salvatore



Bug#1034086: tcpdump: CVE-2023-1801

2023-04-08 Thread Romain Francoise
Hi Salvatore,

On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso  wrote:
> The following vulnerability was published for tcpdump.
>
> CVE-2023-1801[0]:
> | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
> | of-bounds write when decoding a crafted network packet.

Thanks. Just in case, I will mention that the SMB printer code is
*not* enabled in Debian anymore. None of the supported distributions
(oldstable, stable, testing/sid) are affected.

-- 
Romain Francoise 
https://people.debian.org/~rfrancoise/



Bug#1034086: tcpdump: CVE-2023-1801

2023-04-08 Thread Salvatore Bonaccorso
Source: tcpdump
Version: 4.99.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team 

Hi,

The following vulnerability was published for tcpdump.

CVE-2023-1801[0]:
| The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
| of-bounds write when decoding a crafted network packet.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1801
https://www.cve.org/CVERecord?id=CVE-2023-1801
[1] 
https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc

Regards,
Salvatore