A bug in print-ether.c:ether_print() that could cause buffer overflow in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) was found that may cause a segmentation fault. This issue can be be exploited either locally by making the target system to decode crafted .pcap file using tcpdump, or remotely by sending crafted packets to the network segment where the target system is running tcpdump decoding the live packet capture.
Upstream changelog:
http://www.tcpdump.org/tcpdump-changes.txt