OESA-2022-1863

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1863
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1863.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2022-1863
Upstream
Published
2022-08-26T11:04:11Z
Modified
2025-09-03T06:16:48.082054Z
Summary
tcpdump security update
Details

Tcpdump is a command-line tool for monitoring network traffic. Tcpdump can capture and display the packet headers on a particular network interface or on all interfaces. Tcpdump can display all of the packet headers, or just the ones that match particular criteria.

Security Fix(es):

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.(CVE-2018-16301)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / tcpdump

Package

Name
tcpdump
Purl
pkg:rpm/openEuler/tcpdump&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.3-6.oe1

Ecosystem specific

{
    "src": [
        "tcpdump-4.9.3-6.oe1.src.rpm"
    ],
    "x86_64": [
        "tcpdump-debugsource-4.9.3-6.oe1.x86_64.rpm",
        "tcpdump-debuginfo-4.9.3-6.oe1.x86_64.rpm",
        "tcpdump-help-4.9.3-6.oe1.x86_64.rpm",
        "tcpdump-4.9.3-6.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "tcpdump-debuginfo-4.9.3-6.oe1.aarch64.rpm",
        "tcpdump-4.9.3-6.oe1.aarch64.rpm",
        "tcpdump-help-4.9.3-6.oe1.aarch64.rpm",
        "tcpdump-debugsource-4.9.3-6.oe1.aarch64.rpm"
    ]
}