Tcpcapinfo utility of Tcpreplay has a buffer overflow vulnerability associated with parsing a crafted pcap file. This occurs in the src/tcpcapinfo.c file when capture has a packet that is too large to handle.
|submitted||a year ago|
|in testing||a year ago|
|0||0||#1429521 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [epel-all]|
|0||0||#1429522 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [fedora-all]|
Test results and gating status may sometimes conflict as the gating status is retrieved periodically by Bodhi's backend server, while the test results presented here are retrieved upon page load. If your update is marked as gated while all the tests show green/passed, the next check of gating status should open the gate.