Pull request for security update for tcpreplay #235
54
patchinfo.20251126115242783292.93181000773252/_patchinfo
Normal file
54
patchinfo.20251126115242783292.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,54 @@
|
||||
<patchinfo>
|
||||
<issue tracker="cve" id="2023-43279">cve#2023-43279 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2023-43279</issue>
|
||||
<issue tracker="bnc" id="1248964">VUL-0: CVE-2025-9649: tcpreplay: division-by-zero in the `calc_sleep_time` function of file send_packets.c when processing malformed PPS parameters</issue>
|
||||
<issue tracker="bnc" id="1243845">VUL-0: CVE-2024-22654: tcpreplay: Infinite loop in tcpreplay with malformed ipv6 headers</issue>
|
||||
<issue tracker="cve" id="2025-9649">cve#2025-9649 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-9649</issue>
|
||||
<issue tracker="cve" id="2025-8746">cve#2025-8746 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-8746</issue>
|
||||
<issue tracker="bnc" id="1248596">VUL-0: CVE-2025-9385: A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restri ...</issue>
|
||||
<issue tracker="cve" id="2023-4256">cve#2023-4256 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2023-4256</issue>
|
||||
<issue tracker="bnc" id="1247919">VUL-0: CVE-2025-8746: tcpreplay: autogen: improper input validation and memory bounds checking when processing certain malformed configuration files</issue>
|
||||
<issue tracker="cve" id="2025-9385">cve#2025-9385 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-9385</issue>
|
||||
<issue tracker="bnc" id="1222131">VUL-0: CVE-2024-3024: tcpreplay: heap-based buffer overflow</issue>
|
||||
<issue tracker="cve" id="2025-9157">cve#2025-9157 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-9157</issue>
|
||||
<issue tracker="bnc" id="1218249">VUL-0: CVE-2023-4256: tcpreplay: tcprewrite: double free in tcpedit_dlt_cleanup() in plugins/dlt_plugins.c</issue>
|
||||
<issue tracker="cve" id="2025-9386">cve#2025-9386 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-9386</issue>
|
||||
<issue tracker="bnc" id="1248595">VUL-0: CVE-2025-9384: A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post_args of the file /src/tcpedit/parse_args.c. The manipulation results in null pointer dereference. The attack is only possible w ...</issue>
|
||||
<issue tracker="cve" id="2025-9384">cve#2025-9384 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-9384</issue>
|
||||
<issue tracker="cve" id="2025-51006">cve#2025-51006 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-51006</issue>
|
||||
<issue tracker="bnc" id="1248597">VUL-0: CVE-2025-9386: A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must b ...</issue>
|
||||
<issue tracker="cve" id="2024-22654">cve#2024-22654 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2024-22654</issue>
|
||||
<issue tracker="bnc" id="1221324">VUL-0: CVE-2023-43279: tcpreplay: null pointer dereference in mask_cidr6 component at cidr.c</issue>
|
||||
<issue tracker="bnc" id="1248322">VUL-0: CVE-2025-9157: tcpreplay: The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite.</issue>
|
||||
<issue tracker="bnc" id="1250356">VUL-0: CVE-2025-51006: tcpreplay: double free in tcprewrite via a crafted pcap file</issue>
|
||||
<issue tracker="cve" id="2024-3024">cve#2024-3024 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2024-3024</issue>
|
||||
<packager>mkubecek</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for tcpreplay</summary>
|
||||
<description>This update for tcpreplay fixes the following issues:
|
||||
|
||||
- update to 4.5.2:
|
||||
* features added since 4.4.4
|
||||
- fix/recalculate header checksum for ipv6-frag
|
||||
- IPv6 frag checksum support
|
||||
- AF_XDP socket support
|
||||
- tcpreplay -w (write into a pcap file)
|
||||
- tcpreplay --fixhdrlen
|
||||
- --include and --exclude options
|
||||
- SLL2 support
|
||||
- Haiku support
|
||||
* security fixes reported for 4.4.4 fixed in 4.5.2
|
||||
- CVE-2023-4256 / bsc#1218249
|
||||
- CVE-2023-43279 / bsc#1221324
|
||||
- CVE-2024-3024 / bsc#1222131 (likely)
|
||||
- CVE-2024-22654 / bsc#1243845
|
||||
- CVE-2025-9157 / bsc#1248322
|
||||
- CVE-2025-9384 / bsc#1248595
|
||||
- CVE-2025-9385 / bsc#1248596
|
||||
- CVE-2025-9386 / bsc#1248597
|
||||
- CVE-2025-9649 / bsc#1248964
|
||||
- CVE-2025-51006 / bsc#1250356
|
||||
</description>
|
||||
<package>tcpreplay</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
Submodule tcpreplay updated: d3bd5f0505...195618c8aa
Reference in New Issue
Block a user