Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: tcpreplay | Distribution: SUSE Linux Enterprise 15 SP6 |
Version: 4.4.4 | Vendor: openSUSE |
Release: bp156.1.7 | Build date: Mon May 13 19:21:24 2024 |
Group: Productivity/Networking/Diagnostic | Build host: obs-power9-16 |
Size: 2199654 | Source RPM: tcpreplay-4.4.4-bp156.1.7.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://tcpreplay.appneta.com/ | |
Summary: Network analysis and testing tools |
Tcpreplay is a suite of utilities for editing and replaying previously captured network traffic. It was originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems, and is meanwhile capable of replaying to web servers. It supports switches, routers and IP Flow/NetFlow appliances.
GPL-3.0-only
* Tue Jul 11 2023 Martin Hauke <mardnh@gmx.de> - Update to 4.4.4: * overflow check fix for parse_mpls. * tcpreplay-edit: prevent L2 flooding of ipv6 unicast packets. * CVE-2023-27786: bugs caused by strtok_r. (boo#1209416) * CVE-2023-27783 reachable assert in tcpedit_dlt_cleanup (boo#1209413) * reachable assert in fast_edit_packet. * Mon Jan 02 2023 Dirk Müller <dmueller@suse.com> - update to 4.4.3: * upgrade autogen/libopts to version 5.18.16 * avoid implicit int in configure.ac * remove invalid assert in tree * program exit after send error * make libpcap version test more robust * looping inflates some packet counters * Sat Dec 03 2022 Dirk Müller <dmueller@suse.com> - update to 4.4.2: * This is Tcpreplay suite 4.4.2 * This release contains bug fixes only. * What's Changed * Bug #716 heap-buffer-overflow in get_l2len_protocol() * Bug #721 fixed typo in tcpliveplay.c * Bug #717 avoid assertion in get_layer4_v6 * Bug #718 improved heap-overflow protection * Bug #719 better overflow protection in parse_mpls * Bug #725 FORCE_ALIGN on arm * Bug #729 tcpreplay_edit: disallow both -K and -l options * Bug #735 heap-overflow in get_l2len_protocol * Bug #745 remove autogen.sh from distribution tarballs * Sun Jul 17 2022 Dirk Müller <dmueller@suse.com> - update to 4.4.1: * fix support for feeding PCAP files from STDIN * fix Debian/kfreebsd build * fix typos * safeguard against corrupt packet lengths in checksum functions * fix double free in Juniper DLT * fix to flows.c, fix #665 * update Travis CI to focal * LINUX installed netmap auto detection * Support for Q-in-Q VLAN tags * skipbroadcast * add security policy document * Directories of pcaps as arguments * stage PR from @halver94 * fix PPS calc for long-running sessions * Improve SDK selection * fix directory include feature * mac os tests fail * Revert "send_packet: Avoid clock drift * mac update on multicast * Sat May 08 2021 Ferdinand Thiessen <rpm@fthiessen.de> - Update to version 4.3.4 * Fixes ASAN reports memory leaks while running tests * clean up new_cidr_map() string manipulation on error exit * Fixed invalid --pps value protection * Fixed packets slowly drift further and further behind when they should be sent * Fixed 64 bit rollover can cause pps replay issues after several hours * DLT_NULL/DLT_LOOP support for cross-platform PF_INET6 * Fixed heap buffer overflow in tcpreplay fast_edit_packet * Fixed heap buffer overflow in tcpreplay get_next_packet * Fixed CVE-2020-24266 heap buffer overflow in tcpprep get_l2len * Fixed CVE-2020-24265 heap buffer overflow in tcpprep * handle malformed and unsupported packets as soft errors * Fixed tcprewrite --fixlen not working on DLT conversion * Fixed with multiplier option only first file can be sent and hang * do not create tap0 if device already exists * Mon Jun 15 2020 Martin Pluskal <mpluskal@suse.com> - Update to version 4.3.3: * Increase cache buffers size to accomodate VLAN edits (#594) * Correct L2 header length to correct IP header offset (#583) * Fix warnings from gcc version 10 (#580) * Heap Buffer Overflow in randomize_iparp (#579) * Use after free in get_ipv6_next (#578) * Heap Buffer Overflow in git_ipv6_next (#576) * Call pcap_freecode() on pcap_compile() (#572) * Increase max snaplen to 262144 (#571) * Fix divide by zero in fuzzing (#570) * Unique IP repeats at very high iteration counts (#566) * Fails to compile on FreeBSD amd64 13.0 (#558) * Heap Buffer Overflow in do_checksum (#556) (#577) * Attempt to correct corrupt pcap files, if possible (#557) * Fix GCC v10 warnings (#555) * Remove some duplicated SOURCES entries (#551) * Expand /dev/bpfX hard limit to fix macOS Mojave (#550) * Implement –loopdelay-ms when using –loop=0 (#546) * Heap overflow packet2tree and get_l2len (#530) * Fri Jun 12 2020 Martin Pluskal <mpluskal@suse.com> - Fix building with gcc10 * Thu Mar 14 2019 seanlew@opensuse.org - Update to version 4.3.2 * CVE-2019-8381 memory access in do_checksum() (#538 bsc#1125753) * CVE-2019-8376 NULL pointer dereference get_layer4_v6() (#517 bsc#1125755) * CVE-2019-8377 NULL points dereference get_ipv6_i4proto() (#536 bsc#1125754) * Rename Ethereal to Wireshark (#545) * Mon Dec 31 2018 sean@suspend.net - Update to version 4.3.1: * Fix checkspell detected typos (#531) * Heap overflow packet2tree and get_l2len (#530) - Update to version 4.3.0: * Fix TCP sequence edit seeding (#514) * Fix issues identified by Codacy (#493) * CVE-2018-18408 use-after-free in post_args (#489 bsc#1112354) * CVE-2018-18407 heap-buffer-overflow csum_replace4 (#488 bsc#1112355) * CVE-2018-17974 heap-buffer-overflow dlt_en10mb_encode (#486 bsc#1110786) * CVE-2018-17580 heap-buffer-overflow fast_edit_packet (#485 bsc#1110333) * CVE-2018-17582 heap-buffer-overflow in get_next_acket (#484 bsc#1110285) * Out-of-tree build (#483) * CVE-20180-13112 heap-buffer-overflow in get_l2len (#477) * Closing stdin on pipe (#479) * Second pcap file hangs on multiplier option (#466) * TCP sequence edit ACK corruption (#451) * TCP sequence number edit initial SYN packet should have 0 ACK (#450) * Travis CI build fails due to new build images (#432) * Upgrade libopts to 5.18.12 to address version build issues (#430) * Add ability to change tcp SEQ/ACK numbers (#425) * Hang using loop and netmap options (#424) * tcpprep -S not working for large cache files (#423) * Unable to tcprewrite range of ports with --portmap (#422) * --maxsleep broken for values less than 1000 (#421) * -T flag breaks traffic replay timing (#421) * Respect 2nd packet timing (#418) * Avoid non-blocking behaviour when using STDIN (#416) * pcap containing >1020 packets produces invalid cache file (#415) * manpage typos (#413) * Fails to open tap0 on Zephyr (#411) * Heap-buffer-overflow in get_l2protocol (#410) * Heap-buffer-overflow in packet2tree (#409) * Heap-buffer-overflow in getl2len (#408) * Heap-buffer-overflow in flow_decode (#407) * Rewrite zero IP total length field to match packet length (#406) * Stack-buffer-overflow in tcapinfo (#405) * tcpprep --include option does not exclude (#404) * Negative-size-param memset in dlt_radiotap_get_80211 (#402) * tcpreplay --verbose option not working (#398) * Fix replay when using --with-testnic (#178) * Mon Sep 11 2017 jengelh@inai.de - Trim history recap in description. * Mon Jul 31 2017 mpluskal@suse.com - Update to version 4.2.6: * Test fails on sparc64 (#393) - Changes for version 4.2.5: * Fix issues found by scan-build (#384) * Improve --portmap help message (#381) * AFL detected security crash in fuzz feature (#380) * Coverity static scan detected issues (#374) * Fuzz should not be overwritting Layer 3 (#372) * Add --fuzz-factor option to specify fuzz ratio (#371) * Warnings when building on old distributions (#368) * Fix more Lintian detected spelling errors (#365) * Fuzz test failure on ARM and MIPS (#364) - Changes for version 4.2.4: * Fix Lintian detected spelling errors (#362) - Changes for version 4.2.3: * Archive (remove) QuickTX until maintainer found (#357) * Ubuntu precise 32bit_build (#356) - Changes for version 4.2.2: * Archive (remove) QuickTX (#357) * Missing symbol pcap_version on macOS 10.12.4 (#356) - Changes for version 4.2.1: * Fix reporting of rates < 1Mbps (#348) * Option --unique-ip not working properly (#346) - Changes for version 4.2.0: * MAC rewriting capabilities (#313) * Fix several issues identified by Coverity (#305) * Packet destortion --fuzz-seed option by Gabriel Ganne (#302) * Add --unique-ip-loops option to modify IPs every few loops (#296) * Netmap startup delay increase (#290) * tcpcapinfo buffer overflow vulnerablily (#278) * Update git-clone instructions by Kyle McDonald (#277) * Allow fractions for --pps option (#270) * Print per-loop stats with --stats=0 (#269) * Add protection against packet drift by Guillaume Scott (#268) * Print flow stats periodically with --stats output (#262) * Include Travis-CI build support by Ilya Shipitsin (#264) (#285) * tcpreplay won't replay all packets in a pcap file with --netmap (#255) * First and last packet times in --stats output (#239) * Switch to wire speed after 30 minutes at 6 Gbps (#210) * tcprewrite fix checksum properly for fragmented packets (#190) - Drop no longer needed patch (already in upstream): * 278-fail-if-capture-has-a-packet-that-is-too-large.patch - Use %make_install macro - Update dependencies to support (libnl3 and dbus-1) * Thu Mar 16 2017 mkubecek@suse.cz - 278-fail-if-capture-has-a-packet-that-is-too-large.patch: buffer overflow in tcpcapinfo utility triggered by too large packet (CVE-2017-6429 bsc#1028234) * Mon Nov 21 2016 mkubecek@suse.cz - update to version 4.1.2 * increase max packet size to 65549 (CVE-2016-6160 bsc#987846) * minor build fixes * Wed Feb 03 2016 mkubecek@suse.cz - add upstream changelog to docs - minor specfile cleanup * Sun Jan 31 2016 mpluskal@suse.com - Install LICENSE - Use url for source - Add gpg signature - Make building more verbose - Cleanup spec file with spec-cleaner * Thu Jan 28 2016 mkubecek@suse.cz - run specfile through cleaner service to silence check scripts * Tue Jan 12 2016 mkubecek@suse.cz - update to version 4.1.1 * various fixes * performance improvements * add --duration option which lets the user set the number of seconds to transmit * do not require --loop for --unique-ip * tun/tap support * support multiple CIDR ranges with tcprewrite * Mon Mar 09 2015 mkubecek@suse.cz - upgrade to version 4.1.0 * Quick TX bypass module for Linux Kernel - allows Tcpreplay to bypass the kernel network stack and write directly to the network driver (disabled for now) * add a flag to customize netmap delay * add a loop delay option * fix: segfault in tcpliveplay on x86_64 * fix: sometimes unable to interrupt with Ctrl-C * Tue Nov 25 2014 mkubecek@suse.cz - upgrade to version 4.0.5 * various bugfixes; for details see https://github.com/appneta/tcpreplay/releases/tag/v4.0.5
/usr/bin/tcpbridge /usr/bin/tcpcapinfo /usr/bin/tcpliveplay /usr/bin/tcpprep /usr/bin/tcpreplay /usr/bin/tcpreplay-edit /usr/bin/tcprewrite /usr/share/doc/packages/tcpreplay /usr/share/doc/packages/tcpreplay/CHANGELOG /usr/share/licenses/tcpreplay /usr/share/licenses/tcpreplay/LICENSE /usr/share/man/man1/tcpbridge.1.gz /usr/share/man/man1/tcpcapinfo.1.gz /usr/share/man/man1/tcpliveplay.1.gz /usr/share/man/man1/tcpprep.1.gz /usr/share/man/man1/tcpreplay-edit.1.gz /usr/share/man/man1/tcpreplay.1.gz /usr/share/man/man1/tcprewrite.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 19:51:39 2024