Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#7684 - Warning on tcpdump
Attached to Project:
Arch Linux
Opened by DaNiMoTh (DaNiMoTh) - Thursday, 26 July 2007, 09:42 GMT
Last edited by Eric Belanger (Snowman) - Friday, 27 July 2007, 00:48 GMT
Opened by DaNiMoTh (DaNiMoTh) - Thursday, 26 July 2007, 09:42 GMT
Last edited by Eric Belanger (Snowman) - Friday, 27 July 2007, 00:48 GMT
|
Details------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#33 ------------------------------------------------------------ Name: tcpdump Date: 2007-07-25 Severity: Medium Warning #: 2007-#33 ------------------------------------------------------------ Product Background =================== A tool for network monitoring and data acquisition Problem Background =================== The return value of a call to snprintf is not sanitized before being used in an addition to calculate the number of bytes remaining the buffer within a loop. The result is a remotely exploitable buffer overflow since the length calculation will eventually underflow and thus make the length parameter of subsequent snprintf calls irrelevant. Impact ================== A remote attacker could execute arbitrary code. Problem Packages =================== Package: tcpdump Repo: current Group: network Unsafe: < 3.9.7 Safe: >= 3.9.7 Package Fix =================== Upgrade to 3.9.7 =================== Unofficial ArchLinux Security Bug Tracker: http://jjdanimoth.netsons.org/alsw.html Reference(s) =================== http://bugs.gentoo.org/show_bug.cgi?id=184815 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798 |
This task depends upon
Closed by Eric Belanger (Snowman)
Friday, 27 July 2007, 00:48 GMT
Reason for closing: Fixed
Additional comments about closing: now rebuilt for x86_64
Friday, 27 July 2007, 00:48 GMT
Reason for closing: Fixed
Additional comments about closing: now rebuilt for x86_64
Comment by Dan McGee (toofishes) -
Thursday, 26 July 2007, 23:37 GMT
Taken care of on the i686 side, x86_64 still needs to rebuild.