FEDORA-EPEL-2017-5a6edcfeb7

security update in Fedora EPEL 5 for tcpreplay

Status: testing 8 months ago

Here is what is fixed in this release:

  • Fix reporting of rates < 1Mbps (#348)
  • Option --unique-ip not working properly (#346)

Features and fixes include:

  • MAC rewriting capabilities by Pedro Arthur (#313)
  • Fix several issues identified by Coverity (#305)
  • Packet distortion --fuzz-seed option by Gabriel Ganne (#302)
  • Add --unique-ip-loops option to modify IPs every few loops (#296)
  • Netmap startup delay increase (#290)
  • tcpcapinfo buffer overflow vulnerablily (#278)
  • Update git-clone instructions by Kyle McDonald (#277)
  • Allow fractions for --pps option (#270)
  • Print per-loop stats with --stats=0 (#269)
  • Add protection against packet drift by Guillaume Scott (#268)
  • Print flow stats periodically with --stats output (#262)
  • Include Travis-CI build support by Ilya Shipitsin (#264) (#285)
  • tcpreplay won't replay all packets in a pcap file with --netmap (#255)
  • First and last packet times in --stats output (#239)
  • Switch to wire speed after 30 minutes at 6 Gbps (#210)
  • tcprewrite fix checksum properly for fragmented packets (#190)

Comments 3

This update has been submitted for testing by bojan.

This update has been pushed to testing.

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes


Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown.

-1 0 +1 Feedback Guidelines
#1429521 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [epel-all]
Is the update generally functional?
Content Type
RPM
Status
testing
Submitted by
Update Type
security
Karma
0
stable threshold: 3
unstable threshold: -3
Autopush
Enabled
Dates
submitted 8 months ago
in testing 8 months ago

Related Bugs 1

00 #1429521 CVE-2017-6429 tcpreplay: Buffer overflow in Tcpcapinfo utility [epel-all]

Automated Test Results