[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 809-1] tcpdump security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : tcpdump
Version        : 4.9.0-1~deb7u1
CVE ID         : CVE-2016-7922 CVE-2016-7923 CVE-2016-7924 CVE-2016-7925 
                 CVE-2016-7926 CVE-2016-7927 CVE-2016-7928 CVE-2016-7929 
                 CVE-2016-7930 CVE-2016-7931 CVE-2016-7932 CVE-2016-7933 
                 CVE-2016-7934 CVE-2016-7935 CVE-2016-7936 CVE-2016-7937 
                 CVE-2016-7938 CVE-2016-7939 CVE-2016-7940 CVE-2016-7973 
                 CVE-2016-7974 CVE-2016-7975 CVE-2016-7983 CVE-2016-7984 
                 CVE-2016-7985 CVE-2016-7986 CVE-2016-7992 CVE-2016-7993 
                 CVE-2016-8574 CVE-2016-8575 CVE-2017-5202 CVE-2017-5203 
                 CVE-2017-5204 CVE-2017-5205 CVE-2017-5341 CVE-2017-5342 
                 CVE-2017-5482 CVE-2017-5483 CVE-2017-5484 CVE-2017-5485 
                 CVE-2017-5486


Multiple vulnerabilities have been discovered in tcpdump, a command-line
network traffic analyzer. These vulnerabilities might result in denial of
service or the execution of arbitrary code.

CVE-2016-7922

    Buffer overflow in parser.

CVE-2016-7923

    Buffer overflow in parser.

CVE-2016-7924

    Buffer overflow in parser.

CVE-2016-7925

    Buffer overflow in parser.

CVE-2016-7926

    Buffer overflow in parser.

CVE-2016-7927

    Buffer overflow in parser.

CVE-2016-7928

    Buffer overflow in parser.

CVE-2016-7929

    Buffer overflow in parser.

CVE-2016-7930

    Buffer overflow in parser.

CVE-2016-7931

    Buffer overflow in parser.

CVE-2016-7932

    Buffer overflow in parser.

CVE-2016-7933

    Buffer overflow in parser.

CVE-2016-7934

    Buffer overflow in parser.

CVE-2016-7935

    Buffer overflow in parser.

CVE-2016-7936

    Buffer overflow in parser.

CVE-2016-7937

    Buffer overflow in parser.

CVE-2016-7938

    Buffer overflow in parser.

CVE-2016-7939

    Buffer overflow in parser.

CVE-2016-7940

    Buffer overflow in parser.

CVE-2016-7973

    Buffer overflow in parser.

CVE-2016-7974

    Buffer overflow in parser.

CVE-2016-7975

    Buffer overflow in parser.

CVE-2016-7983

    Buffer overflow in parser.

CVE-2016-7984

    Buffer overflow in parser.

CVE-2016-7985

    Buffer overflow in parser.

CVE-2016-7986

    Buffer overflow in parser.

CVE-2016-7992

    Buffer overflow in parser.

CVE-2016-7993

    Buffer overflow in parser.

CVE-2016-8574

    Buffer overflow in parser.

CVE-2016-8575

    Buffer overflow in parser.

CVE-2017-5202

    Buffer overflow in parser.

CVE-2017-5203

    Buffer overflow in parser.

CVE-2017-5204

    Buffer overflow in parser.

CVE-2017-5205

    Buffer overflow in parser.

CVE-2017-5341

    Buffer overflow in parser.

CVE-2017-5342

    Buffer overflow in parser.

CVE-2017-5482

    Buffer overflow in parser.

CVE-2017-5483

    Buffer overflow in parser.

CVE-2017-5484

    Buffer overflow in parser.

CVE-2017-5485

    Buffer overflow in parser.

CVE-2017-5486

    Buffer overflow in parser.

For Debian 7 "Wheezy", these problems have been fixed in version
4.9.0-1~deb7u1.

We recommend that you upgrade your tcpdump packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
 -------------- Ola Lundqvist --------------------
/  opal@debian.org       GPG fingerprint          \
|  ola@inguza.com        22F2 32C6 B1E0 F4BF 2B26 |
|  http://inguza.com/    0A6A 5E90 DCFA 9426 876F /
 -------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJYj7kVAAoJEF6Q3PqUJodv760P/iglBWp9kHkBlTtX3CqZDulq
MbOU9fZxjqXeDgo3WIyRd1OCRMoWjIr0NqkYfa/XTqIQTIBSqY4U0yeKe2B90Xeg
ZJzVxd8hiY0VZ1e4InlaXObGZWvRUX7kGZ3/zRDTr0CTSvNPG4Mv64+Y/Wrj4Ts9
NnyQmWyiG66571EOYeh+nTL7UVXo3U4HWp9/UJL0b0MmxwbON370qETBcNQvoKmx
V1SVWAFsVgtIXHLToSMGGlA0IDhBrvaONOUpwUzzihOTpjJm1Zci7LKRJZc/Sb85
07819v4qTNaONA5q58SBu/rEaI+kufKYBKAhcDfb1iIJ5PUCD8hNafIQSFsTALWX
71gXAGPPA95932PSLfMknudifuOfemsVXqv41M9807Gf0dz4JbLkWUfg8UZIc+EB
p+vOWwUqUpXPAD0PmeSxKZkIh+cqKTbODWqYnR0pLIHL1/wzZKsQAmQQgD1RHTMA
iloV+4WMBD/bvqR6HSDu+VGSfeIwNZXLxoiTTWL6XoEvv8SpUeNfPxuv6rfAoFeE
MgMvOQxu+ae7GVvdVFH5uPNQpCp1YQd3tEnMIpAU0a6NYNDCI9E1rAQOYgpHlTjD
lipSE2iF/iMn3AFUpekxw5IL8Qeps1rUe7vsDvOxDtlrTmDtrgu1BBoP1YmbIJ3N
Z3+wp0QwMaYEJukmbwHI
=/Lay
-----END PGP SIGNATURE-----


Reply to: