Debian Security Advisory

DLA-2444-1 tcpdump -- LTS security update

Date Reported:
10 Nov 2020
Affected Packages:
tcpdump
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 973877.
In Mitre's CVE dictionary: CVE-2020-8037.
More information:

The ppp de-capsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.

The buffer should be big enough to hold the captured data, but it doesn’t need to be big enough to hold the entire on-the-network packet, if we haven’t captured all of it.

For Debian 9 stretch, this problem has been fixed in version 4.9.3-1~deb9u2.

We recommend that you upgrade your tcpdump packages.

For the detailed security status of tcpdump please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tcpdump

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS