Bug#945092: Security: tcpxtract crash (heap-buffer-overflow) on Buster/Stretch/Jessie

2024-04-23 Thread Vladimir Petko
Hi, I have also run into a related issue caused by the ambiguous lexer definition - it matched whitespace using dot rule and the configuration file failed to parse. I have used the attached patch to resolve it. Thank you for considering the patch! Best Regards, Vladimir. Description: resolve

Bug#945092: Security: tcpxtract crash (heap-buffer-overflow) on Buster/Stretch/Jessie

2024-04-21 Thread Vladimir Petko
Dear Maintainers, It seems that the crash was caused by the uninitialized pointer 'srch_machine'. The code checks it for NULL before initializing it properly. Since the pointer was not initialized to NULL occasionally the initialization did not happen and the code tried to access uninitialized

Bug#945092: Security: tcpxtract crash (heap-buffer-overflow) on Buster/Stretch/Jessie

2019-11-19 Thread Antoine Cervoise
Package: tcpxtract Versions: 1.0.1-13 Dear Maintainer, tcpxtract when analyzing the following file (crash.tcpdump). Crash exists on Debian Jessie, Stretch and Buster (Bullseye and Sid seems to use the same package as Buster). Versions are 1.0.1-13 (buster), 1.0.1-11 (stretch), 1.0.1-8