Debian Security Advisory
DSA-3775-1 tcpdump -- security update
- Date Reported:
- 29 Jan 2017
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925, CVE-2016-7926, CVE-2016-7927, CVE-2016-7928, CVE-2016-7929, CVE-2016-7930, CVE-2016-7931, CVE-2016-7932, CVE-2016-7933, CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937, CVE-2016-7938, CVE-2016-7939, CVE-2016-7940, CVE-2016-7973, CVE-2016-7974, CVE-2016-7975, CVE-2016-7983, CVE-2016-7984, CVE-2016-7985, CVE-2016-7986, CVE-2016-7992, CVE-2016-7993, CVE-2016-8574, CVE-2016-8575, CVE-2017-5202, CVE-2017-5203, CVE-2017-5204, CVE-2017-5205, CVE-2017-5341, CVE-2017-5342, CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485, CVE-2017-5486.
- More information:
Multiple vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service or the execution of arbitrary code.
For the stable distribution (jessie), these problems have been fixed in version 4.9.0-1~deb8u1.
For the testing distribution (stretch), these problems have been fixed in version 4.9.0-1.
For the unstable distribution (sid), these problems have been fixed in version 4.9.0-1.
We recommend that you upgrade your tcpdump packages.