A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html
https://security.gentoo.org/glsa/201702-30
https://access.redhat.com/errata/RHSA-2017:1871
http://www.securitytracker.com/id/1037755