Bug 15513 - tcpdump new security issues CVE-2015-0261 and CVE-2015-215[3-5]
Summary: tcpdump new security issues CVE-2015-0261 and CVE-2015-215[3-5]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/637025/
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK a...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-03-17 22:12 CET by David Walser
Modified: 2015-03-24 00:59 CET (History)
3 users (show)

See Also:
Source RPM: tcpdump-4.6.2-5.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-03-17 22:12:40 CET
Debian has issued an advisory today (March 17):
https://www.debian.org/security/2015/dsa-3193

Mageia 4 and Mageia 5 are affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-03-17 22:12:45 CET

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-03-17 22:23:10 CET
Patches checked into Mageia 4 and Cauldron SVN.  Freeze push requested for Cauldron.
Comment 2 David Walser 2015-03-18 23:22:20 CET
Patched packages uploaded for Mageia 4 and Cauldron.

Advisory:
========================

Updated tcpdump package fixes security vulnerabilities:

Several vulnerabilities have been discovered in tcpdump. These vulnerabilities
might result in denial of service (application crash) or, potentially,
execution of arbitrary code (CVE-2015-0261, CVE-2015-2153, CVE-2015-2154,
CVE-2015-2155).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155
https://www.debian.org/security/2015/dsa-3193
========================

Updated packages in core/updates_testing:
========================
tcpdump-4.4.0-2.3.mga4

from tcpdump-4.4.0-2.3.mga4.src.rpm

Version: Cauldron => 4
Assignee: bugsquad => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => (none)

Comment 3 David Walser 2015-03-19 13:10:23 CET
There are PoC files embedded in the upstream patches linked from the RedHat bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1201792
https://bugzilla.redhat.com/show_bug.cgi?id=1201795

Locally I removed the code changes from those patches (as they're redundant with the Debian patches I already added), used git to apply the patches (needed because they create binary files), and had it run make check.  The make check did fail on the testcases, but it looks like that's just because the output didn't exactly match what it expected, but these test cases were written for a newer version of tcpdump.  It does look like it worked correctly, and it certainly didn't crash, so I think it's OK.

Doing a normal capture worked fine:
tcpdump -c 20 -i ens32 -envvXX

Testing complete Mageia 4 i586.

For x86_64, a normal capture test should be sufficient.

Whiteboard: (none) => has_procedure MGA4-32-OK
Severity: normal => major

Comment 4 olivier charles 2015-03-22 17:39:28 CET
Testing on Mageia4x64 real hardware,

From current package :
--------------------
tcpdump-4.4.0-2.2.mga4

Tried various capture commands

# tcpdump -i enp3s0
captures all packets in enp3s0 interface

# tcpdump -c 4 -i enp3s0
captures only 4 packets from enp3s0 interface.

# tcpdump -w /home/zitounu/Documents/tcpdump.pcap -i enp3s0
Captures all packets from enp3s0 interface and write them in a pcap file

# tcpdump -tttt -r /home/zitounu/Documents/tcpdump.pcap
reads the pcap file

# tcpdump -i enp3s0 port 80
only captures the packets received by port 80

To updated testing package :
--------------------------
tcpdump-4.4.0-2.3.mga4

# tcpdump -i enp3s0
# tcpdump -c 4 -i enp3s0
# tcpdump -w /home/zitounu/Documents/tcpdump.pcap -i enp3s0
# tcpdump -tttt -r /home/zitounu/Documents/tcpdump.pcap
# tcpdump -i enp3s0 port 80

All OK

CC: (none) => olchal
Whiteboard: has_procedure MGA4-32-OK => has_procedure MGA4-32-OK MGA4-64-OK

Comment 5 Rémi Verschelde 2015-03-24 00:45:18 CET
Advisory uploaded, validating. Please push to 4 core/updates.

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK => has_procedure MGA4-32-OK MGA4-64-OK advisory
CC: (none) => remi, sysadmin-bugs

Comment 6 Mageia Robot 2015-03-24 00:59:10 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0114.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.