Commit 5507dbe8 authored by Lev Lamberov's avatar Lev Lamberov

[SECURITY] [DSA 4547-1] tcpdump security update

parent 8f60e5b2
<define-tag pagetitle>DSA-4547-1 tcpdump</define-tag>
<define-tag report_date>2019-10-21</define-tag>
<define-tag secrefs>CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166</define-tag>
<define-tag packages>tcpdump</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag fixed-section>no</define-tag>
#use wml::debian::security
</dl>
<define-tag description>security update</define-tag>
<define-tag moreinfo>
<p>Several vulnerabilities have been discovered in tcpdump, a command-line
network traffic analyzer. These vulnerabilities might result in denial of
service or, potentially, execution of arbitrary code.</p>
<p>For the oldstable distribution (stretch), these problems have been fixed
in version 4.9.3-1~deb9u1.</p>
<p>For the stable distribution (buster), these problems have been fixed in
version 4.9.3-1~deb10u1.</p>
<p>We recommend that you upgrade your tcpdump packages.</p>
<p>For the detailed security status of tcpdump please refer to
its security tracker page at:
<a href="https://security-tracker.debian.org/tracker/tcpdump">\
https://security-tracker.debian.org/tracker/tcpdump</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2019/dsa-4547.data"
# $Id: $
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment