tcpreplay 4.4.1-2ubuntu1 source package in Ubuntu

Changelog

tcpreplay (4.4.1-2ubuntu1) kinetic; urgency=medium

  * SECURITY UPDATE: heap-overflow in get_l2len_protocol
    - debian/patches/CVE-2022-25484_27941.patch: fix heap overflow in
      get_l2len_protocol
    - CVE-2022-25484
    - CVE-2022-27941
  * SECURITY UPDATE: reachable assertion in get_layer4_v6
    - debian/patches/CVE-2022-27939.patch: fix null pointer dereference in
      get_layer4_v6
    - CVE-2022-27939
  * SECURITY UPDATE: heap-overflow in get_ipv6_next
    - debian/patches/CVE-2022-27940_37047_37049.patch: Add end_ptr to key
      functions, which make it easier to implement overflow protections
    - CVE-2022-27940
    - CVE-2022-37047
    - CVE-2022-37049
  * SECURITY UPDATE: heap-overflow in parse_mpls
    - debian/patches/CVE-2022-27942.patch: Add better overflow protection in
      parse_mpls
    - CVE-2022-27942
  * SECURITY UPDATE: format string vulnerability in fix_ipv6_checksums
    - debian/patches/CVE-2022-28487.patch: fix format string in
      src/tcpedit/edit_packet.c file
    - CVE-2022-28487
  * SECURITY UPDATE: heap-overflow in get_l2len_protocol
    - debian/patches/CVE-2022-37048.patch: fix heap-overflow by checking data
      length correctly
    - CVE-2022-37048

 -- Nishit Majithia <email address hidden>  Tue, 27 Sep 2022 09:25:27 +0530

Upload details

Uploaded by:
Nishit Majithia
Sponsored by:
Alex Murray
Uploaded to:
Kinetic
Original maintainer:
Ubuntu Developers
Architectures:
amd64 arm64 armel hppa hurd-i386 i386 kfreebsd-amd64 kfreebsd-i386 m68k powerpc ppc64 ppc64el riscv64 s390x sh4 x32
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Lunar release universe net

Downloads

File Size SHA-256 Checksum
tcpreplay_4.4.1.orig.tar.xz 733.4 KiB 51f70ed14be5913f19c25cdfa530e98c14cedab1c76fbdd26eca7b61b57344f2
tcpreplay_4.4.1.orig.tar.xz.asc 516 bytes ecc09b60227d21984a84e0effa2c45331e745534ad063076e376174fcb73f84a
tcpreplay_4.4.1-2ubuntu1.debian.tar.xz 13.5 KiB 8e1a794edf95dfaaee51f89dd7760df6d32334c33e31c621765e4feaaac796e7
tcpreplay_4.4.1-2ubuntu1.dsc 2.1 KiB 7df45652c7c9d1e4605787f8bf9c00f5cb968653b3842e1978b6e19c2f757025

View changes file

Binary packages built by this source

tcpreplay: Tool to replay saved tcpdump files at arbitrary speeds

 Tcpreplay is aimed at testing the performance of a NIDS by
 replaying real background network traffic in which to hide
 attacks. Tcpreplay allows you to control the speed at which the
 traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 programmatically-generated artificial traffic which doesn't
 exercise the application/protocol inspection that a NIDS performs,
 and doesn't reproduce the real-world anomalies that appear on
 production networks (asymmetric routes, traffic bursts/lulls,
 fragmentation, retransmissions, etc.), tcpreplay allows for exact
 replication of real traffic seen on real networks. It included the following
 executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 based captures are possible.

tcpreplay-dbgsym: No summary available for tcpreplay-dbgsym in ubuntu kinetic.

No description available for tcpreplay-dbgsym in ubuntu kinetic.