Bug 14673 - tcpdump new security issues CVE-2014-876[7-9]
Summary: tcpdump new security issues CVE-2014-876[7-9]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/623284/
Whiteboard: MGA4-32-OK MGA4-64-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-11-27 15:30 CET by David Walser
Modified: 2014-12-01 18:57 CET (History)
2 users (show)

See Also:
Source RPM: tcpdump-4.4.0-2.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-11-27 15:30:28 CET
Fedora has issued an advisory on November 22:
https://lists.fedoraproject.org/pipermail/package-announce/2014-November/144951.html

Note that the CVE-2014-8768 issue doesn't affect the version in Mageia 4 because the geonet code is not present.

Patched packages uploaded for Mageia 4 and Cauldron.

Note to QA: there are PoC's on the RedHat bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1165160
https://bugzilla.redhat.com/show_bug.cgi?id=1165162

Advisory:
========================

Updated tcpdump packages fix security vulnerabilities:

The Tcpdump program could crash when processing a malformed OLSR payload
when the verbose output flag was set (CVE-2014-8767).

The application decoder for the Ad hoc On-Demand Distance Vector (AODV)
protocol in Tcpdump fails to perform input validation and performs unsafe
out-of-bound accesses. The application will usually not crash, but perform
out-of-bounds accesses and output/leak larger amounts of invalid data, which
might lead to dropped packets. It is unknown if a payload exists that might
trigger segfaults (CVE-2014-8769).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769
https://lists.fedoraproject.org/pipermail/package-announce/2014-November/144951.html
========================

Updated packages in core/updates_testing:
========================
tcpdump-4.4.0-2.1.mga4

from tcpdump-4.4.0-2.1.mga4.src.rpm

Reproducible: 

Steps to Reproduce:
David Walser 2014-11-28 18:17:02 CET

URL: (none) => http://lwn.net/Vulnerabilities/623284/

Comment 1 olivier charles 2014-11-29 07:51:00 CET
Testing on Mageia4x32 real hardware

With current package :
--------------------
# rpm -q tcpdump
tcpdump-4.4.0-2.mga4

Using PoC mentionned in Description,
wrote 2 python tests :
-tcpdump.py : OLSR payload
-tcpdump2.py : AODV

# tcpdump -i lo -s 0 -n -v

# python tcpdump.py    #OLSR test
tcpdump crashes after writing pages in console.
# dmesg
(...)
[ 2010.891499] tcpdump[7111]: segfault at b72cd000 ip 0804d565 sp bf9e90c0 error 4 in tcpdump[8048000+b1000

# python tcpdump2.py    #AODV test
tcpdump doesn't crash, in tcpdump console, writes pages filled with : {::}(0) which ends with [|rerr]
dmsg didn't produce a segmentation fault.

With updated testing packages :
-----------------------------

# rpm -q tcpdump
tcpdump-4.4.0-2.1.mga4

None of the tests produce any crash or segmentation fault. The AODV test doesn't produce lengthy pages.

Testing package installs well and fixes security vulnerability.

CC: (none) => olchal
Whiteboard: (none) => MGA4-32-OK

Comment 2 olivier charles 2014-11-30 00:28:01 CET
Testing on Mageia4-64 real hardware

Same procedure 

From current package :
--------------------
tcpdump-2:4.4.0-2.mga4.x86_64

which produced a segmentation fault with both PoC tcpdump tests 

To updated testing package :
--------------------------
tcpdump-4.4.0-2.1.mga4.x86_64

which didn't crash or produce segmentation fault with same tests.

OK

Whiteboard: MGA4-32-OK => MGA4-32-OK MGA4-64-OK

Comment 3 Rémi Verschelde 2014-11-30 12:16:38 CET
Validating, advisory uploaded.

Keywords: (none) => validated_update
Whiteboard: MGA4-32-OK MGA4-64-OK => MGA4-32-OK MGA4-64-OK advisory
CC: (none) => sysadmin-bugs

Comment 4 Mageia Robot 2014-12-01 18:57:42 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0503.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.