[SECURITY] [DLA 809-1] tcpdump security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package : tcpdump
Version : 4.9.0-1~deb7u1
CVE ID : CVE-2016-7922 CVE-2016-7923 CVE-2016-7924 CVE-2016-7925
CVE-2016-7926 CVE-2016-7927 CVE-2016-7928 CVE-2016-7929
CVE-2016-7930 CVE-2016-7931 CVE-2016-7932 CVE-2016-7933
CVE-2016-7934 CVE-2016-7935 CVE-2016-7936 CVE-2016-7937
CVE-2016-7938 CVE-2016-7939 CVE-2016-7940 CVE-2016-7973
CVE-2016-7974 CVE-2016-7975 CVE-2016-7983 CVE-2016-7984
CVE-2016-7985 CVE-2016-7986 CVE-2016-7992 CVE-2016-7993
CVE-2016-8574 CVE-2016-8575 CVE-2017-5202 CVE-2017-5203
CVE-2017-5204 CVE-2017-5205 CVE-2017-5341 CVE-2017-5342
CVE-2017-5482 CVE-2017-5483 CVE-2017-5484 CVE-2017-5485
CVE-2017-5486
Multiple vulnerabilities have been discovered in tcpdump, a command-line
network traffic analyzer. These vulnerabilities might result in denial of
service or the execution of arbitrary code.
CVE-2016-7922
Buffer overflow in parser.
CVE-2016-7923
Buffer overflow in parser.
CVE-2016-7924
Buffer overflow in parser.
CVE-2016-7925
Buffer overflow in parser.
CVE-2016-7926
Buffer overflow in parser.
CVE-2016-7927
Buffer overflow in parser.
CVE-2016-7928
Buffer overflow in parser.
CVE-2016-7929
Buffer overflow in parser.
CVE-2016-7930
Buffer overflow in parser.
CVE-2016-7931
Buffer overflow in parser.
CVE-2016-7932
Buffer overflow in parser.
CVE-2016-7933
Buffer overflow in parser.
CVE-2016-7934
Buffer overflow in parser.
CVE-2016-7935
Buffer overflow in parser.
CVE-2016-7936
Buffer overflow in parser.
CVE-2016-7937
Buffer overflow in parser.
CVE-2016-7938
Buffer overflow in parser.
CVE-2016-7939
Buffer overflow in parser.
CVE-2016-7940
Buffer overflow in parser.
CVE-2016-7973
Buffer overflow in parser.
CVE-2016-7974
Buffer overflow in parser.
CVE-2016-7975
Buffer overflow in parser.
CVE-2016-7983
Buffer overflow in parser.
CVE-2016-7984
Buffer overflow in parser.
CVE-2016-7985
Buffer overflow in parser.
CVE-2016-7986
Buffer overflow in parser.
CVE-2016-7992
Buffer overflow in parser.
CVE-2016-7993
Buffer overflow in parser.
CVE-2016-8574
Buffer overflow in parser.
CVE-2016-8575
Buffer overflow in parser.
CVE-2017-5202
Buffer overflow in parser.
CVE-2017-5203
Buffer overflow in parser.
CVE-2017-5204
Buffer overflow in parser.
CVE-2017-5205
Buffer overflow in parser.
CVE-2017-5341
Buffer overflow in parser.
CVE-2017-5342
Buffer overflow in parser.
CVE-2017-5482
Buffer overflow in parser.
CVE-2017-5483
Buffer overflow in parser.
CVE-2017-5484
Buffer overflow in parser.
CVE-2017-5485
Buffer overflow in parser.
CVE-2017-5486
Buffer overflow in parser.
For Debian 7 "Wheezy", these problems have been fixed in version
4.9.0-1~deb7u1.
We recommend that you upgrade your tcpdump packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- --
-------------- Ola Lundqvist --------------------
/ opal@debian.org GPG fingerprint \
| ola@inguza.com 22F2 32C6 B1E0 F4BF 2B26 |
| http://inguza.com/ 0A6A 5E90 DCFA 9426 876F /
-------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=/Lay
-----END PGP SIGNATURE-----
Reply to: