https://bugzilla.suse.com/show_bug.cgi?id=1217032 Bug ID: 1217032 Summary: VUL-0: scamper: TCP packet parsing buffer overflow via large TCP fast open cookie Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: sebix+novell.com@sebix.at Reporter: carlos.lopez@suse.com QA Contact: security-team@suse.de CC: dmueller@suse.com Target Milestone: --- Found By: --- Blocker: --- [scamper-announce] scamper-cvs-20230614d Matthew Luckie mjl at luckie.org.nz Mon Oct 9 10:37:01 PDT 2023 Previous message (by thread): [scamper-announce] scamper-cvs-20230614c Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] https://www.caida.org/catalog/software/scamper/code/scamper-cvs-20230614d.ta... SHA256 (scamper-cvs-20230614d.tar.gz) = 54423b64a0b68aafa903d9260c2bff5c16f3cca44997e0e830d17296f6f03a59 SIZE (scamper-cvs-20230614d.tar.gz) = 2214467 scamper: * fix buffer overflow when parsing TCP packets where the sender includes a TCP fast open cookie larger than 16 bytes. References: https://mailman.caida.org/pipermail/scamper-announce/2023-October/000037.htm... -- You are receiving this mail because: You are on the CC list for the bug.