File _patchinfo of Package patchinfo.19350

<patchinfo incident="19350">
  <issue tracker="cve" id="2025-9649"/>
  <issue tracker="cve" id="2025-9384"/>
  <issue tracker="cve" id="2024-22654"/>
  <issue tracker="cve" id="2024-3024"/>
  <issue tracker="cve" id="2023-43279"/>
  <issue tracker="cve" id="2025-9157"/>
  <issue tracker="cve" id="2025-9386"/>
  <issue tracker="cve" id="2025-8746"/>
  <issue tracker="cve" id="2025-9385"/>
  <issue tracker="cve" id="2025-51006"/>
  <issue tracker="cve" id="2023-4256"/>
  <issue tracker="bnc" id="1248595">VUL-0: CVE-2025-9384: A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post_args of the file /src/tcpedit/parse_args.c. The manipulation results in null pointer dereference. The attack is only possible w ...</issue>
  <issue tracker="bnc" id="1250356">VUL-0: CVE-2025-51006: tcpreplay: double free in tcprewrite via a crafted pcap file</issue>
  <issue tracker="bnc" id="1221324">VUL-0: CVE-2023-43279: tcpreplay: null pointer dereference in mask_cidr6 component at cidr.c</issue>
  <issue tracker="bnc" id="1247919">VUL-0: CVE-2025-8746: tcpreplay: autogen: improper input validation and memory bounds checking when processing certain malformed configuration files</issue>
  <issue tracker="bnc" id="1248964">VUL-0: CVE-2025-9649: tcpreplay: division-by-zero in the `calc_sleep_time` function of file send_packets.c when processing malformed PPS parameters</issue>
  <issue tracker="bnc" id="1218249">VUL-0: CVE-2023-4256: tcpreplay: tcprewrite: double free in tcpedit_dlt_cleanup() in plugins/dlt_plugins.c</issue>
  <issue tracker="bnc" id="1248596">VUL-0: CVE-2025-9385: A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restri ...</issue>
  <issue tracker="bnc" id="1243845">VUL-0: CVE-2024-22654: tcpreplay: Infinite loop in tcpreplay with malformed ipv6 headers</issue>
  <issue tracker="bnc" id="1248322">VUL-0: CVE-2025-9157: tcpreplay: The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite.</issue>
  <issue tracker="bnc" id="1222131">VUL-0: CVE-2024-3024: tcpreplay: heap-based buffer overflow</issue>
  <issue tracker="bnc" id="1248597">VUL-0: CVE-2025-9386: A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must b ...</issue>
  <packager>mkubecek</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for tcpreplay</summary>
  <description>This update for tcpreplay fixes the following issues:

- update to 4.5.2:
  * features added since 4.4.4
    - fix/recalculate header checksum for ipv6-frag
    - IPv6 frag checksum support
    - AF_XDP socket support
    - tcpreplay -w (write into a pcap file)
    - tcpreaplay --fixhdrlen
    - --include and --exclude options
    - SLL2 support
    - Haiku support
  * security fixes reported for 4.4.4 fixed in 4.5.2
    - CVE-2023-4256  / boo#1218249
    - CVE-2023-43279 / boo#1221324
    - CVE-2024-3024  / boo#1222131 (likely)
    - CVE-2024-22654 / boo#1243845
    - CVE-2025-9157  / boo#1248322
    - CVE-2025-9384  / boo#1248595
    - CVE-2025-9385  / boo#1248596
    - CVE-2025-9386  / boo#1248597
    - CVE-2025-9649  / boo#1248964
    - CVE-2025-51006 / boo#1250356
  - see https://github.com/appneta/tcpreplay/compare/v4.4.4...v4.5.2
    for full changelog
- security fix for CVE-2025-8746 / boo#1247919
</description>
</patchinfo>
openSUSE Build Service is sponsored by