UbuntuUpdates.org

Package "tcpflow-dbg"

Name: tcpflow-dbg

Description:

TCP flow recorder - debug symbols

Latest version: 1.4.5+repack1-1ubuntu0.1
Release: xenial (16.04)
Level: security
Repository: universe
Head package: tcpflow
Homepage: https://github.com/simsong/tcpflow

Links


Download "tcpflow-dbg"


Other versions of "tcpflow-dbg" in Xenial

Repository Area Version
base universe 1.4.5+repack1-1
updates universe 1.4.5+repack1-1ubuntu0.1

Changelog

Version: 1.4.5+repack1-1ubuntu0.1 2019-04-24 21:06:21 UTC

  tcpflow (1.4.5+repack1-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Stack-based buffer over-read
    - debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
    - debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
      by CVE-2018-18409-1.patch
    - debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
      sizeof(addr2) lgoci error in un_pair
    - CVE-2018-18409

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2018-14938.patch: fix integer overflow in
      WifiPacket::handle_prism()
    - CVE-2018-14938

 -- Mike Salvatore <email address hidden> Wed, 24 Apr 2019 09:09:59 -0400

CVE-2018-18409 A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leadi
CVE-2018-14938 An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during cap



About   -   Send Feedback to @ubuntu_updates