FEDORA-EPEL-2017-1871d47e50

security update in Fedora EPEL 5 for tcpreplay

Status: unpushed

Patch CVE-2017-6429.

Tcpcapinfo utility of Tcpreplay has a buffer overflow vulnerability associated with parsing a crafted pcap file. This occurs in the src/tcpcapinfo.c file when capture has a packet that is too large to handle.

References:

http://seclists.org/bugtraq/2017/Mar/22

Upstream bug:

https://github.com/appneta/tcpreplay/issues/278

Comments 3

This update has been submitted for testing by bojan.

This update has been pushed to testing.

This update has been unpushed.


Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines
#1429521 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [epel-all]
#1429522 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [fedora-all]
Is the update generally functional?
Content Type
RPM
Status
unpushed
Test Gating Status
Tests not running
Submitted by
Update Type
security
Karma
0
stable threshold: 3
unstable threshold: -3
Autopush
Enabled
Dates
submitted a year ago
in testing a year ago

Related Bugs 2

00 #1429521 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [epel-all]
00 #1429522 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [fedora-all]

Automated Test Results

Test results and gating status may sometimes conflict as the gating status is retrieved periodically by Bodhi's backend server, while the test results presented here are retrieved upon page load. If your update is marked as gated while all the tests show green/passed, the next check of gating status should open the gate.