ArchLinux: 201504-20: tcpdump: denial of service
Summary
A vulnerability was discovered in print-wb.c that is leading to a segmentation fault triggered through feeding into tcpdump a crafted packet, either from a live network interface or from a .pcap file.
Resolution
Upgrade to 4.7.3-2.
# pacman -Syu "tcpdump>=4.7.3-2"
The problem has been fixed upstream but no release is available yet.
References
https://access.redhat.com/security/cve/CVE-2015-3138 https://github.com/the-tcpdump-group/tcpdump/issues/446
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.