It was discovered that tcpflow incorrectly handled certain malformed network packets. A remote attacker could send these packets to a target system, causing tcpflow to crash or possibly disclose sensitive information.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.4.5+repack1-1ubuntu0.1", "binary_name": "tcpflow" }, { "binary_version": "1.4.5+repack1-1ubuntu0.1", "binary_name": "tcpflow-dbg" }, { "binary_version": "1.4.5+repack1-1ubuntu0.1", "binary_name": "tcpflow-dbgsym" }, { "binary_version": "1.4.5+repack1-1ubuntu0.1", "binary_name": "tcpflow-nox" }, { "binary_version": "1.4.5+repack1-1ubuntu0.1", "binary_name": "tcpflow-nox-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1", "binary_name": "tcpflow" }, { "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1", "binary_name": "tcpflow-dbgsym" }, { "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1", "binary_name": "tcpflow-nox" }, { "binary_version": "1.4.5+repack1-4ubuntu0.18.04.1", "binary_name": "tcpflow-nox-dbgsym" } ] }