-
tcpflow (1.4.5+repack1-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Stack-based buffer over-read
- debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
- debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
by CVE-2018-18409-1.patch
- debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
sizeof(addr2) lgoci error in un_pair
- CVE-2018-18409
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2018-14938.patch: fix integer overflow in
WifiPacket::handle_prism()
- CVE-2018-14938
-- Mike Salvatore <email address hidden> Wed, 24 Apr 2019 09:09:59 -0400
-
tcpflow (1.4.5+repack1-1) unstable; urgency=medium
* New upstream release
* -b 0 now works (Closes: #638804)
-- Dima Kogan <email address hidden> Tue, 25 Aug 2015 20:55:52 -0700
-
tcpflow (1.4.4+repack1-3) unstable; urgency=medium
* Bug fix: "tcpflow with no -i doesn't work", thanks to
<email address hidden>; (Closes: #734064).
* Bug fix: "tcpflow prints "write error to stdout" after every
packet", thanks to Frank Gevaerts (Closes: #736417).
* I now build a 'tcpflow-nox' package to provide a tcpflow without
dependencies on x11 (Closes: #729360).
* Bumped Standards-Version to 3.9.5; no changes necessary
-- Dima Kogan <email address hidden> Sat, 31 May 2014 12:49:51 -0700