Bug ID 1217032
Summary VUL-0: scamper: TCP packet parsing buffer overflow via large TCP fast open cookie
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.4
Hardware Other
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee sebix+novell.com@sebix.at
Reporter carlos.lopez@suse.com
QA Contact security-team@suse.de
CC dmueller@suse.com
Target Milestone ---
Found By ---
Blocker ---

[scamper-announce] scamper-cvs-20230614d
Matthew Luckie mjl at luckie.org.nz
Mon Oct 9 10:37:01 PDT 2023
Previous message (by thread): [scamper-announce] scamper-cvs-20230614c
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
https://www.caida.org/catalog/software/scamper/code/scamper-cvs-20230614d.tar.gz

SHA256 (scamper-cvs-20230614d.tar.gz) =
54423b64a0b68aafa903d9260c2bff5c16f3cca44997e0e830d17296f6f03a59
SIZE (scamper-cvs-20230614d.tar.gz) = 2214467

scamper:
* fix buffer overflow when parsing TCP packets where the sender
  includes a TCP fast open cookie larger than 16 bytes.

References:
https://mailman.caida.org/pipermail/scamper-announce/2023-October/000037.html


You are receiving this mail because: