Change logs for tcpflow source package in Xenial

  • tcpflow (1.4.5+repack1-1ubuntu0.1) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Stack-based buffer over-read
        - debian/patches/CVE-2018-18409-1.patch: fix theoretical stack overflow
        - debian/patches/CVE-2018-18409-2.patch: fix compile errors introduced
          by CVE-2018-18409-1.patch
        - debian/patches/CVE-2018-18409-3.patch: fix sizeof(addr1) and
          sizeof(addr2) lgoci error in un_pair
        - CVE-2018-18409
    
      * SECURITY UPDATE: Integer overflow
        - debian/patches/CVE-2018-14938.patch: fix integer overflow in
          WifiPacket::handle_prism()
        - CVE-2018-14938
    
     -- Mike Salvatore <email address hidden>  Wed, 24 Apr 2019 09:09:59 -0400
  • tcpflow (1.4.5+repack1-1) unstable; urgency=medium
    
      * New upstream release
      * -b 0 now works (Closes: #638804)
    
     -- Dima Kogan <email address hidden>  Tue, 25 Aug 2015 20:55:52 -0700
  • tcpflow (1.4.4+repack1-3) unstable; urgency=medium
    
    
      * Bug fix: "tcpflow with no -i doesn't work", thanks to
        <email address hidden>; (Closes: #734064).
      * Bug fix: "tcpflow prints "write error to stdout" after every
        packet", thanks to Frank Gevaerts (Closes: #736417).
      * I now build a 'tcpflow-nox' package to provide a tcpflow without
        dependencies on x11 (Closes: #729360).
      * Bumped Standards-Version to 3.9.5; no changes necessary
    
     -- Dima Kogan <email address hidden>  Sat, 31 May 2014 12:49:51 -0700