[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-21 Thread Launchpad Bug Tracker
This bug was fixed in the package tcpdump - 4.9.0-1ubuntu1~ubuntu16.10.1

---
tcpdump (4.9.0-1ubuntu1~ubuntu16.10.1) yakkety-security; urgency=medium

  * Backport to yakkety to fix CVEs (LP: #1662177).
  * Reset libpcap dependency to yakkety version
  * Enable crypto support, dropped in zesty because of openssl.
  * Disable some tests failing with older pcap versions

tcpdump (4.9.0-1ubuntu1) zesty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
- debian/{control, README.Debian, tcpdump.dirs, usr.sbin.tcpdump,
  install, rules, patches/patches/90_man_apparmor.diff}:
  + Add AppArmor profile.
- debian/usr.sbin.tcpdump:
  + Allow capability net_admin to support '-j'.

tcpdump (4.9.0-1) unstable; urgency=high

  * New upstream security release, fixing the following:
+ CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
+ CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
+ CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
+ CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
+ CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
+ CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
+ CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
+ CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
+ CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
+ CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
+ CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
+ CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
+ CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
+ CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
+ CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
+ CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
+ CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
+ CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
+ CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
+ CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
+ CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
+ CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
+ CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
+ CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
+ CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
+ CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
+ CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
  buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
  lightweight resolver protocol, PIM).
+ CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
+ CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
+ CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
+ CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
+ CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
+ CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
  OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
  print-ether.c:ether_print().
+ CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
+ CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
+ CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
+ CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
  * Re-enable all tests and bump build-dep on libpcap0.8-dev to >= 1.8
accordingly.
  * Switch Vcs-Git URL to the https one.
  * Adjust lintian override name about dh 9.

tcpdump (4.8.1-2ubuntu1) zesty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
- debian/{control, README.Debian, tcpdump.dirs, usr.sbin.tcpdump,
  install, rules, patches/patches/90_man_apparmor.diff}:
  + Add AppArmor profile.
- debian/usr.sbin.tcpdump:
  + Allow capability net_admin to support '-j'.

tcpdump (4.8.1-2) unstable; urgency=medium

  * Disable new HNCP test, which fails on some buildds for some
as-of-yet unexplained reason.

tcpdump (4.8.1-1) unstable; urgency=medium

  * New upstream release.
  * Re-enable Geneve tests (disabled in 4.7.4-1) and bump build-dep on
libpcap0.8-dev to >= 1.7 accordingly.
  * Disable new pcap version tests which require libpcap 1.8+.

tcpdump (4.7.4-3ubuntu1) zesty; urgency=medium

  * Merge from Debian unstable. (LP: #1624633) Remaining changes:
- debian/{control, README.Debian, tcpdump.dirs, usr.sbin.tcpdump,
  install

[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-21 Thread Launchpad Bug Tracker
This bug was fixed in the package tcpdump - 4.9.0-1ubuntu1~ubuntu12.04.1

---
tcpdump (4.9.0-1ubuntu1~ubuntu12.04.1) precise-security; urgency=medium

  [ Gianfranco Costamagna ]
  * Backport to precise to fix CVEs (LP: #1662177).
  * Reset libpcap dependency to precise version
  * Enable crypto support, dropped in zesty because of openssl.
  * Disable some tests failing with older pcap versions

tcpdump (4.9.0-1ubuntu1) zesty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
- debian/{control, README.Debian, tcpdump.dirs, usr.sbin.tcpdump,
  install, rules, patches/patches/90_man_apparmor.diff}:
  + Add AppArmor profile.
- debian/usr.sbin.tcpdump:
  + Allow capability net_admin to support '-j'.

tcpdump (4.9.0-1) unstable; urgency=high

  * New upstream security release, fixing the following:
+ CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
+ CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
+ CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
+ CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
+ CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
+ CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
+ CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
+ CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
+ CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
+ CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
+ CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
+ CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
+ CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
+ CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
+ CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
+ CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
+ CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
+ CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
+ CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
+ CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
+ CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
+ CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
+ CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
+ CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
+ CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
+ CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
+ CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
  buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
  lightweight resolver protocol, PIM).
+ CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
+ CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
+ CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
+ CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
+ CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
+ CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
  OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
  print-ether.c:ether_print().
+ CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
+ CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
+ CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
+ CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
  * Re-enable all tests and bump build-dep on libpcap0.8-dev to >= 1.8
accordingly.
  * Switch Vcs-Git URL to the https one.
  * Adjust lintian override name about dh 9.

tcpdump (4.8.1-2ubuntu1) zesty; urgency=low

  * Merge from Debian unstable.  Remaining changes:
- debian/{control, README.Debian, tcpdump.dirs, usr.sbin.tcpdump,
  install, rules, patches/patches/90_man_apparmor.diff}:
  + Add AppArmor profile.
- debian/usr.sbin.tcpdump:
  + Allow capability net_admin to support '-j'.

tcpdump (4.8.1-2) unstable; urgency=medium

  * Disable new HNCP test, which fails on some buildds for some
as-of-yet unexplained reason.

tcpdump (4.8.1-1) unstable; urgency=medium

  * New upstream release.
  * Re-enable Geneve tests (disabled in 4.7.4-1) and bump build-dep on
libpcap0.8-dev to >= 1.7 accordingly.
  * Disable new pcap version tests which require libpcap 1.8+.

tcpdump (4.7.4-3ubuntu1) zesty; urgency=medium

  * Merge from Debian unstable. (LP: #1624633) Remaining changes:
- debian/{control, README.Debian, tcpdump.dirs, usr

[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-21 Thread Marc Deslauriers
Thanks for the comments. Ack on the debdiffs, I've built them with a
couple of minor nitpicks and will be releasing them today. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-21 Thread LocutusOfBorg
hi Tyler, sorry for the long delay!

>Thanks for the debdiffs! I'll need a little more info before I
seriously begin sponsoring them. Note >that since tcpdump is in main,
I'll still need to do my own QA.

sure, no problem (BTW I can upload in main too FWIW)

>What investigation did you perform to feel comfortable in disabling the
tests that were disabled?

short story:
the tests are *new* tests, and they need a new pcap to perform correctly (yes, 
the old pcap will fail and make tcpdump crash in such corner cases, this is the 
current status quo, and unless you want me to update libpcap won't change)

the investigation is: Debian disabled the same tests to the same
security uploads, against the same pcap versions (and I confirmed the
tests were failing in Ubuntu too)

long story:
these new tests are e.g. catching some issues with *broken* pcap files, they 
were discovered after pcap was released, and "fixed" in new pcap versions.
Of course they aren't faults in tcpdump, but tcpdump people like to catch them 
:)

Debian usually when a test requires a new libpcap to succeed just bumps
the bounds of the required pcap version, and lives happy. In this case
we need to revert such bump and avoid such tests.

They aren't regressions, probably you can just grab the pcap file from
the source code, try to run against them and you will see the same
failures.

>What amount of testing did you perform? In which Ubuntu releases and in
what environment (whether or >not in a VM, the CPU architecture, etc.)?

everything is amd64, I did test them on Xenial (my primary system), and 
tcpdumped my network interface for some time (I can see the packets correctly).
I setup a Trusty VM and a Yakkety one to test the same things.
Everything has been working correctly.

"sudo tcpdump -i interface" is my test.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-21 Thread LocutusOfBorg
** Changed in: tcpdump (Ubuntu)
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-15 Thread Tyler Hicks
Thanks for the debdiffs! I'll need a little more info before I seriously
begin sponsoring them. Note that since tcpdump is in main, I'll still
need to do my own QA.

What investigation did you perform to feel comfortable in disabling the
tests that were disabled?

What amount of testing did you perform? In which Ubuntu releases and in
what environment (whether or not in a VM, the CPU architecture, etc.)?

** Changed in: tcpdump (Ubuntu)
 Assignee: (unassigned) => LocutusOfBorg (costamagnagianfranco)

** Changed in: tcpdump (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-13 Thread Mathew Hodson
** Tags added: patch

** Tags added: trusty xenial yakkety

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-13 Thread Mathew Hodson
** Information type changed from Public to Public Security

** Changed in: tcpdump (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-06 Thread LocutusOfBorg
** Attachment added: "debdiff-yakkety.filtered"
   
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+attachment/4814073/+files/debdiff-yakkety.filtered

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-06 Thread LocutusOfBorg
** Attachment added: "debdiff-xenial.filtered"
   
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+attachment/4814074/+files/debdiff-xenial.filtered

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-06 Thread LocutusOfBorg
** Attachment added: "debdiff-trusty"
   
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+attachment/4814053/+files/debdiff-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-06 Thread LocutusOfBorg
** Attachment added: "debdiff-trusty.filtered"
   
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+attachment/4814075/+files/debdiff-trusty.filtered

** Description changed:

- debdiffs attached
+ disclaimer for the version bump: Debian did the same, so I presume their
+ security team had good reasons to do it
+ 
+ [14:39:59]  reverse-depends... tcpdump is a tool, not a library
+ [14:40:17]  I reverse-depends can use it by calling the 
binary, and the commandline didn't change
+ [14:40:23]  so, I presume everything is fine
+ [14:40:38]  wrt apparmor, you are right
+ [14:41:52]  btw I'm using tcpdump on xenial right now, it 
works as usual

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-06 Thread LocutusOfBorg
** Attachment added: "debdiff-yakkety"
   
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+attachment/4814051/+files/debdiff-yakkety

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1662177] Re: tcpdump multiple CVEs

2017-02-06 Thread LocutusOfBorg
** Attachment added: "debdiff-xenial"
   
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+attachment/4814052/+files/debdiff-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1662177

Title:
  tcpdump multiple CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/1662177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs