Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: tcpreplay | Distribution: openSUSE Tumbleweed |
Version: 4.4.4 | Vendor: openSUSE |
Release: 1.4 | Build date: Tue Jul 11 18:31:05 2023 |
Group: Productivity/Networking/Diagnostic | Build host: reproducible |
Size: 1057466 | Source RPM: tcpreplay-4.4.4-1.4.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://tcpreplay.appneta.com/ | |
Summary: Network analysis and testing tools |
Tcpreplay is a suite of utilities for editing and replaying previously captured network traffic. It was originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems, and is meanwhile capable of replaying to web servers. It supports switches, routers and IP Flow/NetFlow appliances.
GPL-3.0-only
* Tue Jul 11 2023 Martin Hauke <[email protected]> - Update to 4.4.4: * overflow check fix for parse_mpls. * tcpreplay-edit: prevent L2 flooding of ipv6 unicast packets. * CVE-2023-27786: bugs caused by strtok_r. (boo#1209416) * CVE-2023-27783 reachable assert in tcpedit_dlt_cleanup (boo#1209413) * reachable assert in fast_edit_packet. * Mon Jan 02 2023 Dirk Müller <[email protected]> - update to 4.4.3: * upgrade autogen/libopts to version 5.18.16 * avoid implicit int in configure.ac * remove invalid assert in tree * program exit after send error * make libpcap version test more robust * looping inflates some packet counters * Sat Dec 03 2022 Dirk Müller <[email protected]> - update to 4.4.2: * This is Tcpreplay suite 4.4.2 * This release contains bug fixes only. * What's Changed * Bug #716 heap-buffer-overflow in get_l2len_protocol() * Bug #721 fixed typo in tcpliveplay.c * Bug #717 avoid assertion in get_layer4_v6 * Bug #718 improved heap-overflow protection * Bug #719 better overflow protection in parse_mpls * Bug #725 FORCE_ALIGN on arm * Bug #729 tcpreplay_edit: disallow both -K and -l options * Bug #735 heap-overflow in get_l2len_protocol * Bug #745 remove autogen.sh from distribution tarballs * Sun Jul 17 2022 Dirk Müller <[email protected]> - update to 4.4.1: * fix support for feeding PCAP files from STDIN * fix Debian/kfreebsd build * fix typos * safeguard against corrupt packet lengths in checksum functions * fix double free in Juniper DLT * fix to flows.c, fix #665 * update Travis CI to focal * LINUX installed netmap auto detection * Support for Q-in-Q VLAN tags * skipbroadcast * add security policy document * Directories of pcaps as arguments * stage PR from @halver94 * fix PPS calc for long-running sessions * Improve SDK selection * fix directory include feature * mac os tests fail * Revert "send_packet: Avoid clock drift * mac update on multicast * Sat May 08 2021 Ferdinand Thiessen <[email protected]> - Update to version 4.3.4 * Fixes ASAN reports memory leaks while running tests * clean up new_cidr_map() string manipulation on error exit * Fixed invalid --pps value protection * Fixed packets slowly drift further and further behind when they should be sent * Fixed 64 bit rollover can cause pps replay issues after several hours * DLT_NULL/DLT_LOOP support for cross-platform PF_INET6 * Fixed heap buffer overflow in tcpreplay fast_edit_packet * Fixed heap buffer overflow in tcpreplay get_next_packet * Fixed CVE-2020-24266 heap buffer overflow in tcpprep get_l2len * Fixed CVE-2020-24265 heap buffer overflow in tcpprep * handle malformed and unsupported packets as soft errors * Fixed tcprewrite --fixlen not working on DLT conversion * Fixed with multiplier option only first file can be sent and hang * do not create tap0 if device already exists * Mon Jun 15 2020 Martin Pluskal <[email protected]> - Update to version 4.3.3: * Increase cache buffers size to accomodate VLAN edits (#594) * Correct L2 header length to correct IP header offset (#583) * Fix warnings from gcc version 10 (#580) * Heap Buffer Overflow in randomize_iparp (#579) * Use after free in get_ipv6_next (#578) * Heap Buffer Overflow in git_ipv6_next (#576) * Call pcap_freecode() on pcap_compile() (#572) * Increase max snaplen to 262144 (#571) * Fix divide by zero in fuzzing (#570) * Unique IP repeats at very high iteration counts (#566) * Fails to compile on FreeBSD amd64 13.0 (#558) * Heap Buffer Overflow in do_checksum (#556) (#577) * Attempt to correct corrupt pcap files, if possible (#557) * Fix GCC v10 warnings (#555) * Remove some duplicated SOURCES entries (#551) * Expand /dev/bpfX hard limit to fix macOS Mojave (#550) * Implement –loopdelay-ms when using –loop=0 (#546) * Heap overflow packet2tree and get_l2len (#530) * Fri Jun 12 2020 Martin Pluskal <[email protected]> - Fix building with gcc10 * Thu Mar 14 2019 [email protected] - Update to version 4.3.2 * CVE-2019-8381 memory access in do_checksum() (#538 bsc#1125753) * CVE-2019-8376 NULL pointer dereference get_layer4_v6() (#517 bsc#1125755) * CVE-2019-8377 NULL points dereference get_ipv6_i4proto() (#536 bsc#1125754) * Rename Ethereal to Wireshark (#545) * Mon Dec 31 2018 [email protected] - Update to version 4.3.1: * Fix checkspell detected typos (#531) * Heap overflow packet2tree and get_l2len (#530) - Update to version 4.3.0: * Fix TCP sequence edit seeding (#514) * Fix issues identified by Codacy (#493) * CVE-2018-18408 use-after-free in post_args (#489 bsc#1112354) * CVE-2018-18407 heap-buffer-overflow csum_replace4 (#488 bsc#1112355) * CVE-2018-17974 heap-buffer-overflow dlt_en10mb_encode (#486 bsc#1110786) * CVE-2018-17580 heap-buffer-overflow fast_edit_packet (#485 bsc#1110333) * CVE-2018-17582 heap-buffer-overflow in get_next_acket (#484 bsc#1110285) * Out-of-tree build (#483) * CVE-20180-13112 heap-buffer-overflow in get_l2len (#477) * Closing stdin on pipe (#479) * Second pcap file hangs on multiplier option (#466) * TCP sequence edit ACK corruption (#451) * TCP sequence number edit initial SYN packet should have 0 ACK (#450) * Travis CI build fails due to new build images (#432) * Upgrade libopts to 5.18.12 to address version build issues (#430) * Add ability to change tcp SEQ/ACK numbers (#425) * Hang using loop and netmap options (#424) * tcpprep -S not working for large cache files (#423) * Unable to tcprewrite range of ports with --portmap (#422) * --maxsleep broken for values less than 1000 (#421) * -T flag breaks traffic replay timing (#421) * Respect 2nd packet timing (#418) * Avoid non-blocking behaviour when using STDIN (#416) * pcap containing >1020 packets produces invalid cache file (#415) * manpage typos (#413) * Fails to open tap0 on Zephyr (#411) * Heap-buffer-overflow in get_l2protocol (#410) * Heap-buffer-overflow in packet2tree (#409) * Heap-buffer-overflow in getl2len (#408) * Heap-buffer-overflow in flow_decode (#407) * Rewrite zero IP total length field to match packet length (#406) * Stack-buffer-overflow in tcapinfo (#405) * tcpprep --include option does not exclude (#404) * Negative-size-param memset in dlt_radiotap_get_80211 (#402) * tcpreplay --verbose option not working (#398) * Fix replay when using --with-testnic (#178) * Mon Sep 11 2017 [email protected] - Trim history recap in description.
/usr/bin/tcpbridge /usr/bin/tcpcapinfo /usr/bin/tcpliveplay /usr/bin/tcpprep /usr/bin/tcpreplay /usr/bin/tcpreplay-edit /usr/bin/tcprewrite /usr/share/doc/packages/tcpreplay /usr/share/doc/packages/tcpreplay/CHANGELOG /usr/share/licenses/tcpreplay /usr/share/licenses/tcpreplay/LICENSE /usr/share/man/man1/tcpbridge.1.gz /usr/share/man/man1/tcpcapinfo.1.gz /usr/share/man/man1/tcpliveplay.1.gz /usr/share/man/man1/tcpprep.1.gz /usr/share/man/man1/tcpreplay-edit.1.gz /usr/share/man/man1/tcpreplay.1.gz /usr/share/man/man1/tcprewrite.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Mon Dec 2 23:44:45 2024