33 Upstream CVEs patched

Bug #1847520 reported by JonH
274
This bug affects 3 people
Affects Status Importance Assigned to Milestone
tcpdump (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

https://www.tcpdump.org/public-cve-list.txt lists 33 CVEs that were patched recently in tcpdump and libpcap. The updates were released on September 30, 2019.

information type: Private Security → Public Security
Changed in tcpdump (Ubuntu):
status: New → Confirmed
Revision history for this message
it0001 (it0001-escrypt) wrote :

Open CVEs for tcpdump 4.x:

CVE‑2018‑14463 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463> , CVE‑2018‑14881 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881> , CVE‑2018‑16452 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452> , CVE‑2018‑14462 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462> , CVE‑2018‑16301 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301> , CVE‑2018‑14466 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466> , CVE‑2018‑16451 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451> , CVE‑2019‑15166 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166> , CVE‑2018‑16228 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228> , CVE‑2018‑14461 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461> , CVE‑2018‑14467 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467> , CVE‑2018‑14465 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465> , CVE‑2018‑16300 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300> , CVE‑2018‑14464 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464> , CVE‑2018‑14470 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470> , CVE‑2018‑16227 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227> , CVE‑2018‑16230 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230> , CVE‑2018‑14469 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469> , CVE‑2018‑14880 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880> , CVE‑2018‑16229 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229> , CVE‑2019‑15167 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15167> , CVE‑2018‑14468 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468> , CVE‑2018‑14882 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882>

Revision history for this message
Tobias (tobias-t42) wrote :

The next round of CVEs has been fixed in upstream. is there an expected date when this package will be updated or a quick way to help? i have done some debian packaging but i am not familiar with the ubuntu/canonical processes

Best regards

Tobias

Revision history for this message
Eduardo Barretto (ebarretto) wrote :

This issue was addressed in: https://usn.ubuntu.com/4252-1/

Changed in tcpdump (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.