UbuntuUpdates.org

Package "tcpflow-nox"

Name: tcpflow-nox

Description:

TCP flow recorder - version without X11 dependencies

Latest version: 1.4.5+repack1-4ubuntu0.18.04.1
Release: bionic (18.04)
Level: security
Repository: universe
Head package: tcpflow
Homepage: https://github.com/simsong/tcpflow

Links


Download "tcpflow-nox"


Other versions of "tcpflow-nox" in Bionic

Repository Area Version
base universe 1.4.5+repack1-4build2
updates universe 1.4.5+repack1-4ubuntu0.18.04.1

Changelog

Version: 1.4.5+repack1-4ubuntu0.18.04.1 2019-04-24 21:06:24 UTC

  tcpflow (1.4.5+repack1-4ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Stack-based buffer over-read
    - debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
    - debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
      by CVE-2018-18409-1.patch
    - debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
      sizeof(addr2) lgoci error in un_pair
    - CVE-2018-18409

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2018-14938.patch: fix integer overflow in
      WifiPacket::handle_prism()
    - CVE-2018-14938

 -- Mike Salvatore <email address hidden> Wed, 24 Apr 2019 09:07:55 -0400

CVE-2018-18409 A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leadi
CVE-2018-14938 An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during cap



About   -   Send Feedback to @ubuntu_updates