Buffer overflow in BOOTP parser in print-bootp.c:bootp_print() was found that may cause a segmentation fault. This issue can be be exploited either locally by making the target system to decode crafted .pcap file using tcpdump, or remotely by sending crafted packets to the network segment where the target system is running tcpdump decoding the live packet capture. Upstream changelog: http://www.tcpdump.org/tcpdump-changes.txt
Acknowledgments: Name: the Tcpdump project
Created tcpdump tracking bugs for this issue: Affects: fedora-all [bug 1419114]
*** This bug has been marked as a duplicate of bug 1419066 ***