tcpflow (1.4.5+repack1-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Stack-based buffer over-read
    - debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
    - debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
      by CVE-2018-18409-1.patch
    - debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
      sizeof(addr2) lgoci error in un_pair
    - CVE-2018-18409

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2018-14938.patch: fix integer overflow in
      WifiPacket::handle_prism()
    - CVE-2018-14938

Date: 2019-04-24 16:25:19.715614+00:00
Changed-By: Mike Salvatore <mike.salvat...@canonical.com>
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-1ubuntu0.1
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to