| Summary: | tcpdump new security issue CVE-2023-1801 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, mageia, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | tcpdump-4.99.2-1.mga8.src.rpm | CVE: | CVE-2023-1801 |
| Status comment: | |||
|
Description
David Walser
2023-04-10 21:29:32 CEST
David Walser
2023-04-10 21:37:16 CEST
Whiteboard:
(none) =>
MGA8TOO Updates submitted to Cauldron updates_testing, with a freeze move request. Thanks for doing Cauldron. That leaves Mageia 8. tcpdump is dealt with by different packagers, so have to assign this update globally. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated package fixes a security vulnerability: The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet. (CVE-2023-1801) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1801 https://git.tcpdump.org/tcpdump/blob/HEAD:/CHANGES ======================== Updated package in core/updates_testing: ======================== tcpdump-4.99.2-1.1.mga8 from SRPM: tcpdump-4.99.2-1.1.mga8.src.rpm Whiteboard:
MGA8TOO =>
(none)
PC LX
2023-04-13 10:38:11 CEST
CC:
(none) =>
mageia No installation issues. Used some commands from bug 25565 comment 3 on a Probook 6550b running with an active vpn: # tcpdump -tttt tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on wlo1, link-type EN10MB (Ethernet), snapshot length 262144 bytes 2023-04-18 18:39:55.703814 IP _gateway > all-systems.mcast.net: igmp query v2 2023-04-18 18:39:55.758863 IP linux.local.48783 > 185.141.119.58.openvpn: UDP, length 92 2023-04-18 18:39:55.794518 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 503 2023-04-18 18:39:55.795007 IP linux.local.48783 > 185.141.119.58.openvpn: UDP, length 94 2023-04-18 18:39:55.830613 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 149 2023-04-18 18:39:55.931609 IP6 linux.local.mdns > ff02::fb.mdns: 0 PTR (QM)? 1.1.168.192.in-addr.arpa. (42) 2023-04-18 18:39:55.931794 IP linux.local.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 1.1.168.192.in-addr.arpa. (42) 2023-04-18 18:39:56.932291 IP6 linux.local.mdns > ff02::fb.mdns: 0 PTR (QM)? 1.1.168.192.in-addr.arpa. (42) 2023-04-18 18:39:56.932409 IP linux.local.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 1.1.168.192.in-addr.arpa. (42) 2023-04-18 18:39:58.934285 IP6 linux.local.mdns > ff02::fb.mdns: 0 PTR (QM)? 1.1.168.192.in-addr.arpa. (42) 2023-04-18 18:39:58.934407 IP linux.local.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 1.1.168.192.in-addr.arpa. (42) And more... ^C 32 packets captured 55 packets received by filter 23 packets dropped by kernel (My understanding is that dropping some TCP packets while connected to a UDP VPN is not at all unusual.) # tcpdump -w tmp/tmp.pcap tcpdump: listening on wlo1, link-type EN10MB (Ethernet), snapshot length 262144 bytes Stopped with ^C after a few seconds, then: 9 packets captured 9 packets received by filter 0 packets dropped by kernel # tcpdump -tttt -r tmp/tmp.pcap reading from file tmp/tmp.pcap, link-type EN10MB (Ethernet), snapshot length 262144 2023-04-18 18:46:50.066329 IP linux.local.48783 > 185.141.119.58.openvpn: UDP, length 122 2023-04-18 18:46:50.101624 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 76 2023-04-18 18:46:50.107527 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 122 2023-04-18 18:46:50.148040 IP linux.local.48783 > 185.141.119.58.openvpn: UDP, length 76 2023-04-18 18:46:51.502814 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 76 2023-04-18 18:46:51.503341 IP linux.local.48783 > 185.141.119.58.openvpn: UDP, length 100 2023-04-18 18:46:51.503421 IP linux.local.48783 > 185.141.119.58.openvpn: UDP, length 76 2023-04-18 18:46:51.538758 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 64 2023-04-18 18:46:51.543759 IP 185.141.119.58.openvpn > linux.local.48783: UDP, length 64 Looks OK to me. Validating. Advisory in comment 3. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Dave Hodgins
2023-04-24 00:03:24 CEST
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0154.html Resolution:
(none) =>
FIXED |