tcpflow (1.4.5+repack1-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Stack-based buffer over-read
- debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
- debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
by CVE-2018-18409-1.patch
- debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
sizeof(addr2) lgoci error in un_pair
- CVE-2018-18409
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2018-14938.patch: fix integer overflow in
WifiPacket::handle_prism()
- CVE-2018-14938
Date: 2019-04-24 16:25:19.715614+00:00
Changed-By: Mike Salvatore <mike.salvat...@canonical.com>
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/tcpflow/1.4.5+repack1-1ubuntu0.1
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes