tcpdump: CVE-2023-1801

Related Vulnerabilities: CVE-2023-1801  

Debian Bug report logs - #1034086
tcpdump: CVE-2023-1801

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 8 Apr 2023 11:51:01 UTC

Severity: important

Tags: security, upstream

Found in versions tcpdump/4.99.3-1, tcpdump/4.99.0-2+deb11u1, tcpdump/4.99.0-2

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Romain Francoise <rfrancoise@debian.org>:
Bug#1034086; Package src:tcpdump. (Sat, 08 Apr 2023 11:51:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Romain Francoise <rfrancoise@debian.org>. (Sat, 08 Apr 2023 11:51:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: tcpdump: CVE-2023-1801
Date: Sat, 08 Apr 2023 13:46:53 +0200
Source: tcpdump
Version: 4.99.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for tcpdump.

CVE-2023-1801[0]:
| The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
| of-bounds write when decoding a crafted network packet.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-1801
    https://www.cve.org/CVERecord?id=CVE-2023-1801
[1] https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc

Regards,
Salvatore



Marked as found in versions tcpdump/4.99.0-2+deb11u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 08 Apr 2023 19:45:03 GMT) (full text, mbox, link).


Marked as found in versions tcpdump/4.99.0-2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 08 Apr 2023 19:45:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Romain Francoise <rfrancoise@debian.org>:
Bug#1034086; Package src:tcpdump. (Sat, 08 Apr 2023 19:54:03 GMT) (full text, mbox, link).


Acknowledgement sent to rfrancoise@debian.org:
Extra info received and forwarded to list. Copy sent to Romain Francoise <rfrancoise@debian.org>. (Sat, 08 Apr 2023 19:54:03 GMT) (full text, mbox, link).


Message #14 received at 1034086@bugs.debian.org (full text, mbox, reply):

From: Romain Francoise <rfrancoise@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>
Cc: 1034086@bugs.debian.org
Subject: Re: Bug#1034086: tcpdump: CVE-2023-1801
Date: Sat, 8 Apr 2023 21:49:05 +0200
Hi Salvatore,

On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso <carnil@debian.org> wrote:
> The following vulnerability was published for tcpdump.
>
> CVE-2023-1801[0]:
> | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
> | of-bounds write when decoding a crafted network packet.

Thanks. Just in case, I will mention that the SMB printer code is
*not* enabled in Debian anymore. None of the supported distributions
(oldstable, stable, testing/sid) are affected.

-- 
Romain Francoise <rfrancoise@debian.org>
https://people.debian.org/~rfrancoise/



Information forwarded to debian-bugs-dist@lists.debian.org, Romain Francoise <rfrancoise@debian.org>:
Bug#1034086; Package src:tcpdump. (Sun, 09 Apr 2023 07:09:02 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Romain Francoise <rfrancoise@debian.org>. (Sun, 09 Apr 2023 07:09:02 GMT) (full text, mbox, link).


Message #19 received at 1034086@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: rfrancoise@debian.org, 1034086@bugs.debian.org
Subject: Re: Bug#1034086: tcpdump: CVE-2023-1801
Date: Sun, 9 Apr 2023 09:04:56 +0200
Hi Romain,

On Sat, Apr 08, 2023 at 09:49:05PM +0200, Romain Francoise wrote:
> Hi Salvatore,
> 
> On Sat, Apr 8, 2023 at 1:51 PM Salvatore Bonaccorso <carnil@debian.org> wrote:
> > The following vulnerability was published for tcpdump.
> >
> > CVE-2023-1801[0]:
> > | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-
> > | of-bounds write when decoding a crafted network packet.
> 
> Thanks. Just in case, I will mention that the SMB printer code is
> *not* enabled in Debian anymore. None of the supported distributions
> (oldstable, stable, testing/sid) are affected.

Ah right, I see the binary packages are not affected by the respective
code path, so have marked this in the security-tracker accordingly as
unimportant.

Thanks,

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Apr 9 13:11:38 2023; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.