openSUSE has issued an advisory on December 15: https://lists.opensuse.org/opensuse-updates/2018-12/msg00081.html Mageia 6 is also affected.
Whiteboard: (none) => MGA6TOO
Fixed both Cauldron and mga6!
CC: (none) => geiger.david68210
(In reply to David GEIGER from comment #1) > Fixed both Cauldron and mga6! Thanks, David :-) Assigning to all packagers collectively for the still needed advisory, since there is no registered maintainer for this package.
Assignee: bugsquad => pkg-bugsWhiteboard: MGA6TOO => (none)CC: (none) => marja11Version: Cauldron => 6
Advisory: ======================== Updated tcpdump package fixes security vulnerability: Fixed a stack-based buffer over-read in the print_prefix function (CVE-2018-19519). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19519 https://lists.opensuse.org/opensuse-updates/2018-12/msg00081.html ======================== Updated packages in core/updates_testing: ======================== tcpdump-4.9.2-1.1.mga6 from tcpdump-4.9.2-1.1.mga6.src.rpm
Assignee: pkg-bugs => qa-bugs
To satisfy dependencies, the following package(s) also need to be installed: - lib64smi2-0.5.0-2.mga6.x86_64 - libsmi-mibs-std-0.5.0-2.mga6.x86_64 - smi-tools-0.5.0-2.mga6.x86_64 17MB of additional disk space will be used. I ran tcpdump -tttt and watched the network activity in the network. Working as designed
CC: (none) => brtians1Whiteboard: (none) => MGA6-64-OK
Thanks Brian. Validating & advisorying.
Keywords: (none) => advisory, validated_updateCC: (none) => lewyssmith, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2018-0492.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED