[SECURITY] Fedora 43 Update: tcpreplay-4.5.2-1.fc43

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2025-ecc001d6c5
2025-09-12 19:20:52.461593+00:00
--------------------------------------------------------------------------------

Name        : tcpreplay
Product     : Fedora 43
Version     : 4.5.2
Release     : 1.fc43
URL         : http://tcpreplay.appneta.com/
Summary     : Replay captured network traffic
Description :
Tcpreplay is a tool to replay captured network traffic. Currently, tcpreplay
supports pcap (tcpdump) and snoop capture formats. Also included, is tcpprep
a tool to pre-process capture files to allow increased performance under
certain conditions as well as capinfo which provides basic information about
capture files.

--------------------------------------------------------------------------------
Update Information:

Mostly bugfix release. More info here:
https://github.com/appneta/tcpreplay/releases/tag/v4.5.2
--------------------------------------------------------------------------------
ChangeLog:

* Fri Aug 29 2025 Bojan Smojver <bojan@rexursive com> - 4.5.2-1
- Update to 4.5.2
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2388758 - CVE-2025-9019 tcpreplay: tcpreplay Heap Overflow Vulnerability [epel-10]
        https://bugzilla.redhat.com/show_bug.cgi?id=2388758
  [ 2 ] Bug #2388759 - CVE-2025-9019 tcpreplay: tcpreplay Heap Overflow Vulnerability [epel-8]
        https://bugzilla.redhat.com/show_bug.cgi?id=2388759
  [ 3 ] Bug #2388760 - CVE-2025-9019 tcpreplay: tcpreplay Heap Overflow Vulnerability [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2388760
  [ 4 ] Bug #2388763 - CVE-2025-9019 tcpreplay: tcpreplay Heap Overflow Vulnerability [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2388763
  [ 5 ] Bug #2388764 - CVE-2025-9019 tcpreplay: tcpreplay Heap Overflow Vulnerability [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2388764
  [ 6 ] Bug #2389866 - CVE-2025-9157 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c untrunc_packet use after free [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2389866
  [ 7 ] Bug #2389867 - CVE-2025-9157 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c untrunc_packet use after free [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2389867
  [ 8 ] Bug #2389868 - CVE-2025-9157 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c untrunc_packet use after free [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2389868
  [ 9 ] Bug #2392223 - CVE-2025-9386 tcpreplay: appneta tcpreplay tcprewrite get.c get_l2len_protocol use after free [epel-10]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392223
  [ 10 ] Bug #2392224 - CVE-2025-9386 tcpreplay: appneta tcpreplay tcprewrite get.c get_l2len_protocol use after free [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392224
  [ 11 ] Bug #2392225 - CVE-2025-9384 tcpreplay: appneta tcpreplay parse_args.c tcpedit_post_args null pointer dereference [epel-10]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392225
  [ 12 ] Bug #2392226 - CVE-2025-9384 tcpreplay: appneta tcpreplay parse_args.c tcpedit_post_args null pointer dereference [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392226
  [ 13 ] Bug #2392227 - CVE-2025-9385 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c fix_ipv6_checksums use after free [epel-10]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392227
  [ 14 ] Bug #2392228 - CVE-2025-9385 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c fix_ipv6_checksums use after free [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392228
  [ 15 ] Bug #2392231 - CVE-2025-9385 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c fix_ipv6_checksums use after free [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2392231
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2025-ecc001d6c5' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux