{"id":"RHSA-2017:1871","summary":"Red Hat Security Advisory: tcpdump security, bug fix, and enhancement update","modified":"2026-01-14T11:02:25.807515Z","published":"2024-09-16T00:02:34Z","upstream":["CVE-2015-0261","CVE-2015-2153","CVE-2015-2154","CVE-2015-2155","CVE-2016-7922","CVE-2016-7923","CVE-2016-7924","CVE-2016-7925","CVE-2016-7926","CVE-2016-7927","CVE-2016-7928","CVE-2016-7929","CVE-2016-7930","CVE-2016-7931","CVE-2016-7932","CVE-2016-7933","CVE-2016-7934","CVE-2016-7935","CVE-2016-7936","CVE-2016-7937","CVE-2016-7938","CVE-2016-7939","CVE-2016-7940","CVE-2016-7973","CVE-2016-7974","CVE-2016-7975","CVE-2016-7983","CVE-2016-7984","CVE-2016-7985","CVE-2016-7986","CVE-2016-7992","CVE-2016-7993","CVE-2016-8574","CVE-2016-8575","CVE-2017-5202","CVE-2017-5203","CVE-2017-5204","CVE-2017-5205","CVE-2017-5341","CVE-2017-5342","CVE-2017-5482","CVE-2017-5483","CVE-2017-5484","CVE-2017-5485","CVE-2017-5486"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1871"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1201792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1201795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1201797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1201798"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1292056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1297812"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1419066"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441597"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1871.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-0261"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-0261"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0261"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2153"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2153"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2154"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2154"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2154"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7922"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7922"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7922"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7923"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7923"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7923"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7924"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7924"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7924"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7925"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7925"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7925"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7926"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7926"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7926"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7927"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7928"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7928"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7929"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7930"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7930"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7931"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7933"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7934"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7935"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7935"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7936"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7936"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7937"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7937"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7937"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7938"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7939"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7939"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7939"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7940"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7940"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7940"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7973"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7973"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7973"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7974"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7975"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7983"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7984"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7984"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7984"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7985"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7985"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7985"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7986"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7986"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7986"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7992"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7992"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7992"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-7993"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-7993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7993"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8574"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8574"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8574"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-8575"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-8575"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8575"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5202"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5202"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5202"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5203"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5204"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5204"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5204"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5205"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5205"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5205"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5341"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5342"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5342"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5342"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5482"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5482"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5482"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5483"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5483"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5483"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5484"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5484"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5484"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5485"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5485"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5485"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-5486"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-5486"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5486"}],"affected":[{"package":{"name":"tcpdump","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/tcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/tcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/tcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/tcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/tcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/tcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/tcpdump"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}},{"package":{"name":"tcpdump-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/tcpdump-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14:4.9.0-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1871.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}