Back to bug 2040392
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Michael Kaplan | 2022-01-13 16:04:18 UTC | Depends On | 2040393 | |
| Michael Kaplan | 2022-01-13 16:05:33 UTC | Depends On | 2040395 | |
| Michael Kaplan | 2022-01-13 16:06:47 UTC | Blocks | 2040396 | |
| TEJ RATHI | 2022-01-18 13:55:06 UTC | Depends On | 2041906 | |
| TEJ RATHI | 2022-01-20 10:47:43 UTC | Doc Text | A heap use-after-free flaw was found in tcpslices' extract_slice(). An attacker with local network access could pass specially crafted 'pcap' file to tcpslice causing segmentation fault. This vulnerability halts or crashes the application, leading to a denial of service. | |
| Fixed In Version | tcpslice 1.5 | |||
| RaTasha Tillery-Smith | 2022-01-20 13:50:48 UTC | Doc Text | A heap use-after-free flaw was found in tcpslices' extract_slice(). An attacker with local network access could pass specially crafted 'pcap' file to tcpslice causing segmentation fault. This vulnerability halts or crashes the application, leading to a denial of service. | A heap use-after-free flaw was found in tcpslices' extract_slice(). This flaw allows an attacker with local network access to pass a specially crafted 'pcap' file to tcpslice, causing segmentation fault. This vulnerability halts or crashes the application, leading to a denial of service. |
| Red Hat Bugzilla | 2023-07-07 08:34:14 UTC | Assignee | security-response-team | nobody |
Back to bug 2040392