{"affected":[{"ecosystem_specific":{"binaries":[{"tcpdump":"4.9.2-14.17.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.2-14.17.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tcpdump":"4.9.2-14.17.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"tcpdump","purl":"pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.2-14.17.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tcpdump fixes the following issues:\n\n- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).\n\nThe previous update of tcpdump already fixed variuous Buffer overflow/overread vulnerabilities [bsc#1153098, bsc#1153332]\n\n- CVE-2017-16808 (AoE)\n- CVE-2018-14468 (FrameRelay)\n- CVE-2018-14469 (IKEv1)\n- CVE-2018-14470 (BABEL)\n- CVE-2018-14466 (AFS/RX)\n- CVE-2018-14461 (LDP)\n- CVE-2018-14462 (ICMP)\n- CVE-2018-14465 (RSVP)\n- CVE-2018-14464 (LMP)\n- CVE-2019-15166 (LMP)\n- CVE-2018-14880 (OSPF6)\n- CVE-2018-14882 (RPL)\n- CVE-2018-16227 (802.11)\n- CVE-2018-16229 (DCCP)\n- CVE-2018-14467 (BGP)\n- CVE-2018-14881 (BGP)\n- CVE-2018-16230 (BGP)\n- CVE-2018-16300 (BGP)\n- CVE-2018-14463 (VRRP)\n- CVE-2019-15167 (VRRP)\n- CVE-2018-14879 (tcpdump -V)\n- CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220\n- CVE-2018-16301 (fixed in libpcap)\n- CVE-2018-16451 (SMB)\n- CVE-2018-16452 (SMB)\n- CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled)\n- CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled)\n","id":"SUSE-SU-2020:3360-1","modified":"2020-11-17T12:41:00Z","published":"2020-11-17T12:41:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20203360-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1153098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1153332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178466"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14461"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14462"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14463"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14464"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14466"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14467"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14468"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14469"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-14882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16300"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16451"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16452"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-1010220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8037"}],"related":["CVE-2017-16808","CVE-2018-10103","CVE-2018-10105","CVE-2018-14461","CVE-2018-14462","CVE-2018-14463","CVE-2018-14464","CVE-2018-14465","CVE-2018-14466","CVE-2018-14467","CVE-2018-14468","CVE-2018-14469","CVE-2018-14470","CVE-2018-14879","CVE-2018-14880","CVE-2018-14881","CVE-2018-14882","CVE-2018-16227","CVE-2018-16228","CVE-2018-16229","CVE-2018-16230","CVE-2018-16300","CVE-2018-16301","CVE-2018-16451","CVE-2018-16452","CVE-2019-1010220","CVE-2019-15166","CVE-2019-15167","CVE-2020-8037"],"summary":"Security update for tcpdump","upstream":["CVE-2017-16808","CVE-2018-10103","CVE-2018-10105","CVE-2018-14461","CVE-2018-14462","CVE-2018-14463","CVE-2018-14464","CVE-2018-14465","CVE-2018-14466","CVE-2018-14467","CVE-2018-14468","CVE-2018-14469","CVE-2018-14470","CVE-2018-14879","CVE-2018-14880","CVE-2018-14881","CVE-2018-14882","CVE-2018-16227","CVE-2018-16228","CVE-2018-16229","CVE-2018-16230","CVE-2018-16300","CVE-2018-16301","CVE-2018-16451","CVE-2018-16452","CVE-2019-1010220","CVE-2019-15166","CVE-2019-15167","CVE-2020-8037"]}