Bugzilla – Bug 1112356
VUL-1: CVE-2018-18409: tcpflow: A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW.
Last modified: 2020-01-16 14:33:41 UTC
CVE-2018-18409 A stack-based buffer over-read exists in setbit() at iptree.h of TCPFLOW 1.5.0, due to received incorrect values causing incorrect computation, leading to denial of service during an address_histogram call or a get_histogram call. upstream ticket: https://github.com/simsong/tcpflow/issues/195 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18409 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-18409.html
Hi Greg, currently there is no patch referenced in the upstream ticket. I am not aware of any patch(es) at this time.
This is automated batch bugzilla cleanup. The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such it is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please feel free to reopen this bug against that version (!you must update the "Version" component in the bug fields, do not just reopen please), or alternatively create a new ticket. Thank you for reporting this bug and we are sorry it could not be fixed during the lifetime of the release. [1] https://en.opensuse.org/Lifetime
unfixed in 15.0 , 15.1