Debian Security Advisory
DLA-2444-1 tcpdump -- LTS security update
- Date Reported:
- 10 Nov 2020
- Affected Packages:
- tcpdump
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 973877.
In Mitre's CVE dictionary: CVE-2020-8037. - More information:
-
The ppp de-capsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
The buffer should be big enough to hold the captured data, but it doesn’t need to be big enough to hold the entire on-the-network packet, if we haven’t captured all of it.
For Debian 9 stretch, this problem has been fixed in version 4.9.3-1~deb9u2.
We recommend that you upgrade your tcpdump packages.
For the detailed security status of tcpdump please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tcpdump
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS