<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpcap-devel-1.10.5-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14309-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-04T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-04T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-04T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpcap-devel-1.10.5-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpcap-devel-1.10.5-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14309</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-7256/</URL>
      <Description>SUSE CVE CVE-2023-7256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-8006/</URL>
      <Description>SUSE CVE CVE-2024-8006 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-devel-1.10.5-1.1">
      <FullProductName ProductID="libpcap-devel-1.10.5-1.1">libpcap-devel-1.10.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-devel-32bit-1.10.5-1.1">
      <FullProductName ProductID="libpcap-devel-32bit-1.10.5-1.1">libpcap-devel-32bit-1.10.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap-devel-static-1.10.5-1.1">
      <FullProductName ProductID="libpcap-devel-static-1.10.5-1.1">libpcap-devel-static-1.10.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap1-1.10.5-1.1">
      <FullProductName ProductID="libpcap1-1.10.5-1.1">libpcap1-1.10.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap1-32bit-1.10.5-1.1">
      <FullProductName ProductID="libpcap1-32bit-1.10.5-1.1">libpcap1-32bit-1.10.5-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpcap-devel-1.10.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpcap-devel-1.10.5-1.1">libpcap-devel-1.10.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-32bit-1.10.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpcap-devel-32bit-1.10.5-1.1">libpcap-devel-32bit-1.10.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap-devel-static-1.10.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpcap-devel-static-1.10.5-1.1">libpcap-devel-static-1.10.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-1.10.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpcap1-1.10.5-1.1">libpcap1-1.10.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-32bit-1.10.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpcap1-32bit-1.10.5-1.1">libpcap1-32bit-1.10.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.</Note>
    </Notes>
    <CVE>CVE-2023-7256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpcap-devel-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap-devel-32bit-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap-devel-static-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap1-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap1-32bit-1.10.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-7256.html</URL>
        <Description>CVE-2023-7256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230020</URL>
        <Description>SUSE Bug 1230020</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.</Note>
    </Notes>
    <CVE>CVE-2024-8006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpcap-devel-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap-devel-32bit-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap-devel-static-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap1-1.10.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libpcap1-32bit-1.10.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-8006.html</URL>
        <Description>CVE-2024-8006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230034</URL>
        <Description>SUSE Bug 1230034</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
