tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Fixed upstream by commit
Adding to a existing GLSA Request.
@Security please add cve to database.
Gentoo Security Padawan
This issue was resolved and addressed in
GLSA 201709-23 at https://security.gentoo.org/glsa/201709-23
by GLSA coordinator Aaron Bauman (b-man).