suse-su-2015:0679-1
Vulnerability from csaf_suse
Published
2015-03-20 14:25
Modified
2015-03-20 14:25
Summary
Security update for tcpdump

Notes

Title of the patch
Security update for tcpdump
Description of the patch
tcpdump was updated to fix five vulnerabilities in protocol printers When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network. The following vulnerabilities were fixed: * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220) * PPP printer remote DoS (CVE-2014-9140, bnc#923142) * force printer remote DoS (CVE-2015-2155, bnc#922223) * ethernet printer remote DoS (CVE-2015-2154, bnc#922222) * tcp printer remote DoS (CVE-2015-2153, bnc#922221)
Patchnames
SUSE-SLE-DESKTOP-12-2015-159,SUSE-SLE-SERVER-12-2015-159
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for tcpdump",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "tcpdump was updated to fix five vulnerabilities in protocol printers\n\nWhen running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network.\n\nThe following vulnerabilities were fixed:\n * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)\n * PPP printer remote DoS (CVE-2014-9140, bnc#923142)\n * force printer remote DoS (CVE-2015-2155, bnc#922223)\n * ethernet printer remote DoS (CVE-2015-2154, bnc#922222)\n * tcp printer remote DoS (CVE-2015-2153, bnc#922221)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-DESKTOP-12-2015-159,SUSE-SLE-SERVER-12-2015-159",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0679-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2015:0679-1",
        "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150679-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2015:0679-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922220",
        "url": "https://bugzilla.suse.com/922220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922221",
        "url": "https://bugzilla.suse.com/922221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922222",
        "url": "https://bugzilla.suse.com/922222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 922223",
        "url": "https://bugzilla.suse.com/922223"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 923142",
        "url": "https://bugzilla.suse.com/923142"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-9140 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-9140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0261 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0261/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2153 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2154 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2154/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2155 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2155/"
      }
    ],
    "title": "Security update for tcpdump",
    "tracking": {
      "current_release_date": "2015-03-20T14:25:34Z",
      "generator": {
        "date": "2015-03-20T14:25:34Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2015:0679-1",
      "initial_release_date": "2015-03-20T14:25:34Z",
      "revision_history": [
        {
          "date": "2015-03-20T14:25:34Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tcpdump-4.5.1-7.1.ppc64le",
                "product": {
                  "name": "tcpdump-4.5.1-7.1.ppc64le",
                  "product_id": "tcpdump-4.5.1-7.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tcpdump-4.5.1-7.1.s390x",
                "product": {
                  "name": "tcpdump-4.5.1-7.1.s390x",
                  "product_id": "tcpdump-4.5.1-7.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tcpdump-4.5.1-7.1.x86_64",
                "product": {
                  "name": "tcpdump-4.5.1-7.1.x86_64",
                  "product_id": "tcpdump-4.5.1-7.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Desktop 12",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 12",
                  "product_id": "SUSE Linux Enterprise Desktop 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sled:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12",
                  "product_id": "SUSE Linux Enterprise Server 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
          "product_id": "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64"
        },
        "product_reference": "tcpdump-4.5.1-7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.ppc64le as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le"
        },
        "product_reference": "tcpdump-4.5.1-7.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.s390x as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x"
        },
        "product_reference": "tcpdump-4.5.1-7.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.x86_64 as component of SUSE Linux Enterprise Server 12",
          "product_id": "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64"
        },
        "product_reference": "tcpdump-4.5.1-7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le"
        },
        "product_reference": "tcpdump-4.5.1-7.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x"
        },
        "product_reference": "tcpdump-4.5.1-7.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tcpdump-4.5.1-7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
        },
        "product_reference": "tcpdump-4.5.1-7.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-9140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-9140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-9140",
          "url": "https://www.suse.com/security/cve/CVE-2014-9140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 923142 for CVE-2014-9140",
          "url": "https://bugzilla.suse.com/923142"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-20T14:25:34Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-9140"
    },
    {
      "cve": "CVE-2015-0261",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0261"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0261",
          "url": "https://www.suse.com/security/cve/CVE-2015-0261"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922220 for CVE-2015-0261",
          "url": "https://bugzilla.suse.com/922220"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-20T14:25:34Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0261"
    },
    {
      "cve": "CVE-2015-2153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2153",
          "url": "https://www.suse.com/security/cve/CVE-2015-2153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922221 for CVE-2015-2153",
          "url": "https://bugzilla.suse.com/922221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922222 for CVE-2015-2153",
          "url": "https://bugzilla.suse.com/922222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922223 for CVE-2015-2153",
          "url": "https://bugzilla.suse.com/922223"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-20T14:25:34Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2153"
    },
    {
      "cve": "CVE-2015-2154",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2154"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2154",
          "url": "https://www.suse.com/security/cve/CVE-2015-2154"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922222 for CVE-2015-2154",
          "url": "https://bugzilla.suse.com/922222"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-20T14:25:34Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2154"
    },
    {
      "cve": "CVE-2015-2155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2155",
          "url": "https://www.suse.com/security/cve/CVE-2015-2155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922220 for CVE-2015-2155",
          "url": "https://bugzilla.suse.com/922220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922221 for CVE-2015-2155",
          "url": "https://bugzilla.suse.com/922221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922222 for CVE-2015-2155",
          "url": "https://bugzilla.suse.com/922222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 922223 for CVE-2015-2155",
          "url": "https://bugzilla.suse.com/922223"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server 12:tcpdump-4.5.1-7.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12:tcpdump-4.5.1-7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2015-03-20T14:25:34Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2155"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…