{"id":"MGASA-2014-0511","summary":"Updated tcpdump package fixes security vulnerability","details":"It was discovered that tcpdump incorrectly handled printing PPP packets. A\nremote attacker could use this issue to cause tcpdump to crash, resulting\nin a denial of service, or possibly execute arbitrary code\n(CVE-2014-9140).\n","modified":"2026-02-04T03:14:27.375985Z","published":"2014-12-05T15:54:13Z","related":["CVE-2014-9140"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0511.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14728"},{"type":"REPORT","url":"http://www.ubuntu.com/usn/usn-2433-1/"}],"affected":[{"package":{"name":"tcpdump","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/tcpdump?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-2.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0511.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}