tcpreplay 4.4.1-2ubuntu1 source package in Ubuntu
Changelog
tcpreplay (4.4.1-2ubuntu1) kinetic; urgency=medium * SECURITY UPDATE: heap-overflow in get_l2len_protocol - debian/patches/CVE-2022-25484_27941.patch: fix heap overflow in get_l2len_protocol - CVE-2022-25484 - CVE-2022-27941 * SECURITY UPDATE: reachable assertion in get_layer4_v6 - debian/patches/CVE-2022-27939.patch: fix null pointer dereference in get_layer4_v6 - CVE-2022-27939 * SECURITY UPDATE: heap-overflow in get_ipv6_next - debian/patches/CVE-2022-27940_37047_37049.patch: Add end_ptr to key functions, which make it easier to implement overflow protections - CVE-2022-27940 - CVE-2022-37047 - CVE-2022-37049 * SECURITY UPDATE: heap-overflow in parse_mpls - debian/patches/CVE-2022-27942.patch: Add better overflow protection in parse_mpls - CVE-2022-27942 * SECURITY UPDATE: format string vulnerability in fix_ipv6_checksums - debian/patches/CVE-2022-28487.patch: fix format string in src/tcpedit/edit_packet.c file - CVE-2022-28487 * SECURITY UPDATE: heap-overflow in get_l2len_protocol - debian/patches/CVE-2022-37048.patch: fix heap-overflow by checking data length correctly - CVE-2022-37048 -- Nishit Majithia <email address hidden> Tue, 27 Sep 2022 09:25:27 +0530
Upload details
- Uploaded by:
- Nishit Majithia
- Sponsored by:
- Alex Murray
- Uploaded to:
- Kinetic
- Original maintainer:
- Ubuntu Developers
- Architectures:
- amd64 arm64 armel hppa hurd-i386 i386 kfreebsd-amd64 kfreebsd-i386 m68k powerpc ppc64 ppc64el riscv64 s390x sh4 x32
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Lunar | release | universe | net |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tcpreplay_4.4.1.orig.tar.xz | 733.4 KiB | 51f70ed14be5913f19c25cdfa530e98c14cedab1c76fbdd26eca7b61b57344f2 |
tcpreplay_4.4.1.orig.tar.xz.asc | 516 bytes | ecc09b60227d21984a84e0effa2c45331e745534ad063076e376174fcb73f84a |
tcpreplay_4.4.1-2ubuntu1.debian.tar.xz | 13.5 KiB | 8e1a794edf95dfaaee51f89dd7760df6d32334c33e31c621765e4feaaac796e7 |
tcpreplay_4.4.1-2ubuntu1.dsc | 2.1 KiB | 7df45652c7c9d1e4605787f8bf9c00f5cb968653b3842e1978b6e19c2f757025 |
Available diffs
Binary packages built by this source
- tcpreplay: Tool to replay saved tcpdump files at arbitrary speeds
Tcpreplay is aimed at testing the performance of a NIDS by
replaying real background network traffic in which to hide
attacks. Tcpreplay allows you to control the speed at which the
traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
programmatically-generated artificial traffic which doesn't
exercise the application/protocol inspection that a NIDS performs,
and doesn't reproduce the real-world anomalies that appear on
production networks (asymmetric routes, traffic bursts/lulls,
fragmentation, retransmissions, etc.), tcpreplay allows for exact
replication of real traffic seen on real networks. It included the following
executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
based captures are possible.
- tcpreplay-dbgsym: No summary available for tcpreplay-dbgsym in ubuntu kinetic.
No description available for tcpreplay-dbgsym in ubuntu kinetic.