tcpdump-debugsource vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tcpdump-debugsource package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<14:4.9.3-3.el8_9.1
  • M
Buffer Overflow

<14:4.9.3-1.el8
  • M
Uncontrolled Recursion

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Uncontrolled Recursion

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Buffer Overflow

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Out-of-bounds Read

<14:4.9.3-1.el8
  • M
Improper Input Validation

<14:4.9.3-1.el8
  • M
Improper Input Validation

<14:4.9.3-1.el8
  • L
Allocation of Resources Without Limits or Throttling

<14:4.9.3-2.el8