Bugs fixes in "tcpflow"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2018-14938 | An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during cap | 2019-04-24 |
CVE | CVE-2018-18409 | A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leadi | 2019-04-24 |
CVE | CVE-2018-14938 | An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during cap | 2019-04-24 |
CVE | CVE-2018-18409 | A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leadi | 2019-04-24 |
CVE | CVE-2018-14938 | An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during cap | 2019-04-24 |
CVE | CVE-2018-18409 | A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leadi | 2019-04-24 |
CVE | CVE-2018-14938 | An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during cap | 2019-04-24 |
CVE | CVE-2018-18409 | A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leadi | 2019-04-24 |
Debian | 558209 | no VLAN support for data link type 113 - Debian Bug report logs | 2011-12-18 |
About
-
Send Feedback to @ubuntu_updates