Mageia 2018-0401: tcpflow security update
Summary
pdated tcpflow package fixes security vulnerability:
An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through
1.5.0-alpha. There is an integer overflow in the function handle_prism
during caplen processing. If the caplen is less than 144, one can cause
an integer overflow in the function handle_80211, which will result in
an out-of-bounds read and may allow access to sensitive memory or a
denial of service (CVE-2018-14938).
References
- https://bugs.mageia.org/show_bug.cgi?id=23538
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/EFRZCT4UN4QXFPROASMGHI2MZ7OWZVZ2/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14938
Resolution
MGASA-2018-0401 - Updated tcpflow packages fix security vulnerability
SRPMS
- 6/core/tcpflow-1.5.0-1.mga6