Debian Bug report logs -
#1034086
tcpdump: CVE-2023-1801
Reported by: Salvatore Bonaccorso <carnil@debian.org>
Date: Sat, 8 Apr 2023 11:51:01 UTC
Severity: important
Tags: security, upstream
Found in versions tcpdump/4.99.3-1, tcpdump/4.99.0-2+deb11u1, tcpdump/4.99.0-2
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Romain Francoise <rfrancoise@debian.org>
:
Bug#1034086
; Package src:tcpdump
.
(Sat, 08 Apr 2023 11:51:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Romain Francoise <rfrancoise@debian.org>
.
(Sat, 08 Apr 2023 11:51:03 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: tcpdump
Version: 4.99.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Hi,
The following vulnerability was published for tcpdump.
CVE-2023-1801[0]:
| The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
| of-bounds write when decoding a crafted network packet.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-1801
https://www.cve.org/CVERecord?id=CVE-2023-1801
[1] https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc
Regards,
Salvatore
Marked as found in versions tcpdump/4.99.0-2+deb11u1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sat, 08 Apr 2023 19:45:03 GMT) (full text, mbox, link).
Marked as found in versions tcpdump/4.99.0-2.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sat, 08 Apr 2023 19:45:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Romain Francoise <rfrancoise@debian.org>
:
Bug#1034086
; Package src:tcpdump
.
(Sat, 08 Apr 2023 19:54:03 GMT) (full text, mbox, link).
Acknowledgement sent
to rfrancoise@debian.org
:
Extra info received and forwarded to list. Copy sent to Romain Francoise <rfrancoise@debian.org>
.
(Sat, 08 Apr 2023 19:54:03 GMT) (full text, mbox, link).
Message #14 received at 1034086@bugs.debian.org (full text, mbox, reply):
Hi Salvatore,
On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso <carnil@debian.org> wrote:
> The following vulnerability was published for tcpdump.
>
> CVE-2023-1801[0]:
> | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
> | of-bounds write when decoding a crafted network packet.
Thanks. Just in case, I will mention that the SMB printer code is
*not* enabled in Debian anymore. None of the supported distributions
(oldstable, stable, testing/sid) are affected.
--
Romain Francoise <rfrancoise@debian.org>
https://people.debian.org/~rfrancoise/
Information forwarded
to debian-bugs-dist@lists.debian.org, Romain Francoise <rfrancoise@debian.org>
:
Bug#1034086
; Package src:tcpdump
.
(Sun, 09 Apr 2023 07:09:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Romain Francoise <rfrancoise@debian.org>
.
(Sun, 09 Apr 2023 07:09:02 GMT) (full text, mbox, link).
Message #19 received at 1034086@bugs.debian.org (full text, mbox, reply):
Hi Romain,
On Sat, Apr 08, 2023 at 09:49:05PM +0200, Romain Francoise wrote:
> Hi Salvatore,
>
> On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso <carnil@debian.org> wrote:
> > The following vulnerability was published for tcpdump.
> >
> > CVE-2023-1801[0]:
> > | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
> > | of-bounds write when decoding a crafted network packet.
>
> Thanks. Just in case, I will mention that the SMB printer code is
> *not* enabled in Debian anymore. None of the supported distributions
> (oldstable, stable, testing/sid) are affected.
Ah right, I see the binary packages are not affected by the respective
code path, so have marked this in the security-tracker accordingly as
unimportant.
Thanks,
Regards,
Salvatore
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Apr 9 13:11:38 2023;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.