Buffer overflow in Tcpcapinfo utility triggered by a too large packet

Bug #1677311 reported by Fred Klassen
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tcpreplay (Ubuntu)
Expired
Undecided
Unassigned

Bug Description

I'm the maintainer of the Tcpreplay project. I suggest updating the tcpreplay package to 4.2.1 to pick up this security update. http://www.securityfocus.com/bid/96579/info.

Issue is fixed here https://github.com/appneta/tcpreplay/issues/278.

Latest version available here https://github.com/appneta/tcpreplay/releases.

Colin Watson (cjwatson)
affects: launchpad → tcpreplay (Ubuntu)
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

Changed in tcpreplay (Ubuntu):
status: New → Incomplete
information type: Private Security → Public Security
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for tcpreplay (Ubuntu) because there has been no activity for 60 days.]

Changed in tcpreplay (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.