[ubuntu/xenial-security] tcpflow 1.4.5+repack1-1ubuntu0.1 (Accepted)

Mike Salvatore mike.salvatore at canonical.com
Wed Apr 24 17:40:26 UTC 2019

tcpflow (1.4.5+repack1-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Stack-based buffer over-read
    - debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
    - debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
      by CVE-2018-18409-1.patch
    - debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
      sizeof(addr2) lgoci error in un_pair
    - CVE-2018-18409

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2018-14938.patch: fix integer overflow in
    - CVE-2018-14938

Date: 2019-04-24 16:25:19.715614+00:00
Changed-By: Mike Salvatore <mike.salvatore at canonical.com>
-------------- next part --------------
Sorry, changesfile not available.

More information about the Xenial-changes mailing list