MGASA-2019-0264

Source
https://advisories.mageia.org/MGASA-2019-0264.html
Import Source
https://advisories.mageia.org/MGASA-2019-0264.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0264
Related
Published
2019-09-12T19:09:52Z
Modified
2019-09-12T18:17:17Z
Summary
Updated tcpflow packages fix security vulnerability
Details

Updated tcpflow package fixes security vulnerability:

A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an addresshistogram call or a gethistogram call (CVE-2018-18409).

References
Credits

Affected packages

Mageia:6 / tcpflow

Package

Name
tcpflow
Purl
pkg:rpm/mageia/tcpflow?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.2-1.mga6

Ecosystem specific

{
    "section": "core"
}