On Wed, Jul 26, 2017 at 01:17:47PM +0200, Moritz Muehlenhoff wrote:
> That particular CVE ID is no-dsa by itself, but there's been
> new issues reported (not yet in the BTS, also not sure whether upstream
> has acted on those):
> 
> https://security-tracker.debian.org/tracker/CVE-2017-11541
> https://security-tracker.debian.org/tracker/CVE-2017-11542
> https://security-tracker.debian.org/tracker/CVE-2017-11543
> https://security-tracker.debian.org/tracker/CVE-2017-11544
> https://security-tracker.debian.org/tracker/CVE-2017-11545

This is also in upstream issue tracker:

  https://github.com/the-tcpdump-group/tcpdump/issues/619

These are only issues when using older versions of libpcap. This has been
verified by me and ack'd by the researcher. For example this setup was not
affected:

tcpdump version 4.10.0-PRE-GIT_2017_07_24
libpcap version 1.8.1
OpenSSL 1.0.1t  3 May 2016
Compiled with AddressSanitizer/GCC.

Tcpdump is clearly asking people to test with the latest releases or SCM code
so I don't think they will start analyzing these cases any further. I can
reproduce these issues in Debian if needed? I'm unable to start making patches
or backports though.

> Next point updates are quite some time afar, so let's wait a bit until
> those new ones have been investigated further.

Tcpdump is planning to publish new release soon, which fixes security issues.

-- 
Henri Salo

Reply via email to