tcpdump missing some CVEs

Bug #1444363 reported by Páll Haraldsson
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tcpdump (Ubuntu)
Fix Released
Undecided
Unassigned
Lucid
Won't Fix
Medium
Unassigned
Precise
Fix Released
Medium
Unassigned
Trusty
Fix Released
Medium
Unassigned
Utopic
Fix Released
Medium
Unassigned

Bug Description

Seeing:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-2155

"before 4.7.2 [..] denial of service (crash) and possibly execute arbitrary code"

it seems the fix has not been applied.

There is also CVE-2015-2153 and more (possibly):

https://lists.archlinux.org/pipermail/arch-security/2015-March/000261.html

I was looking into this tcpdump out of curiosity as I have this:

Changes for tcpdump versions:
Installed version: 4.5.1-2ubuntu1
Available version: 4.5.1-2ubuntu1.1

The CVE(s) I listed do not seem to be there. I guess I do not need to be very worried about those missing or the CVEs I get in the fix as/if I do not use tcpdump. My understanding is right that it is only a monitoring tool and *I* need to run it and then an attacker could attack me (the system would never have to start it?!)?

Anyway, others might be worried about these things or should. In 14.04, the version number 4.5.1, is that something to worry about? I *assume* "before 4.7.2" means all those upstream versions are not fixed, but Ubuntu backports/fixes them?

description: updated
information type: Private Security → Public Security
Revision history for this message
Seth Arnold (seth-arnold) wrote :

Hello,

Please note that Ubuntu, much like Debian, SuSE, and Red Hat, backport security fixes to the versions that we have shipped, so comparing version numbers alone isn't a reliable way to determine which vulnerabilities, if any, are still open for a given package. For more information, see our FAQ and Debian's FAQ entries (the Debian faq doesn't apply directly, but I like this specific entry.) https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions and https://www.debian.org/security/faq#version)

You can see that this CVE is still not handled yet:
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-2155.html
and that tcpdump has several more known security issues that need to be fixed:
http://people.canonical.com/~ubuntu-security/cve/pkg/tcpdump.html

Our CVE tracking database can be queried at http://people.canonical.com/~ubuntu-security/cve/

We can't fix every issue immediately, and we have to prioritize our work based on the severity of the issue and how common the tools are, how much user interaction might be necessary to make exploits work. etc.

Thanks

Changed in tcpdump (Ubuntu):
status: New → Fix Released
Changed in tcpdump (Ubuntu Lucid):
status: New → Confirmed
Changed in tcpdump (Ubuntu Precise):
status: New → Confirmed
Changed in tcpdump (Ubuntu Trusty):
status: New → Confirmed
Changed in tcpdump (Ubuntu Utopic):
status: New → Confirmed
Changed in tcpdump (Ubuntu Lucid):
importance: Undecided → Medium
Changed in tcpdump (Ubuntu Precise):
importance: Undecided → Medium
Changed in tcpdump (Ubuntu Trusty):
importance: Undecided → Medium
Changed in tcpdump (Ubuntu Utopic):
importance: Undecided → Medium
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package tcpdump - 4.6.2-1ubuntu1.2

---------------
tcpdump (4.6.2-1ubuntu1.2) utopic-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    multiple issues (LP: #1444363)
    - debian/patches/60_cve-2015-0261.diff: check lengths in
      print-mobility.c.
    - debian/patches/60_cve-2015-2153.diff: check length in
      print-rpki-rtr.c.
    - debian/patches/60_cve-2015-2153-fix-regression.diff: more length
      checks in print-rpki-rtr.c.
    - debian/patches/60_cve-2015-2154.diff: check lengths in
      print-isoclns.c.
    - debian/patches/60_cve-2015-2155.diff: make sure ops->print is valid
      in print-forces.c.
    - CVE-2015-0261
    - CVE-2015-2153
    - CVE-2015-2154
    - CVE-2015-2155
 -- Marc Deslauriers <email address hidden> Fri, 24 Apr 2015 12:51:00 -0400

Changed in tcpdump (Ubuntu Utopic):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package tcpdump - 4.5.1-2ubuntu1.2

---------------
tcpdump (4.5.1-2ubuntu1.2) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    multiple issues (LP: #1444363)
    - debian/patches/60_cve-2015-0261.diff: check lengths in
      print-mobility.c.
    - debian/patches/60_cve-2015-2153.diff: check length in
      print-rpki-rtr.c.
    - debian/patches/60_cve-2015-2153-fix-regression.diff: more length
      checks in print-rpki-rtr.c.
    - debian/patches/60_cve-2015-2154.diff: check lengths in
      print-isoclns.c.
    - debian/patches/60_cve-2015-2155.diff: make sure ops->print is valid
      in print-forces.c.
    - CVE-2015-0261
    - CVE-2015-2153
    - CVE-2015-2154
    - CVE-2015-2155
 -- Marc Deslauriers <email address hidden> Fri, 24 Apr 2015 13:06:07 -0400

Changed in tcpdump (Ubuntu Trusty):
status: Confirmed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package tcpdump - 4.2.1-1ubuntu2.2

---------------
tcpdump (4.2.1-1ubuntu2.2) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    multiple issues (LP: #1444363)
    - debian/patches/60_cve-2015-0261.diff: check lengths in
      print-mobility.c.
    - debian/patches/60_cve-2015-2153.diff: check length in
      print-rpki-rtr.c.
    - debian/patches/60_cve-2015-2153-fix-regression.diff: more length
      checks in print-rpki-rtr.c.
    - debian/patches/60_cve-2015-2154.diff: check lengths in
      print-isoclns.c.
    - debian/patches/60_cve-2015-2155.diff: make sure ops->print is valid
      in print-forces.c.
    - CVE-2015-0261
    - CVE-2015-2153
    - CVE-2015-2154
    - CVE-2015-2155
 -- Marc Deslauriers <email address hidden> Fri, 24 Apr 2015 15:15:57 -0400

Changed in tcpdump (Ubuntu Precise):
status: Confirmed → Fix Released
Revision history for this message
Rolf Leggewie (r0lf) wrote :

lucid has seen the end of its life and is no longer receiving any updates. Marking the lucid task for this ticket as "Won't Fix".

Changed in tcpdump (Ubuntu Lucid):
status: Confirmed → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.