Fedora has issued an advisory on March 23: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/ The issues are fixed upstream in 4.3.2.
Status comment: (none) => Fixed upstream in 4.3.2
fixed for mga6!
CC: (none) => geiger.david68210
Advisory: ======================== Updated tcpreplay package fixes security vulnerabilities: An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_layer4_v6() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact (CVE-2019-8376). An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact (CVE-2019-8377). An issue was discovered in Tcpreplay 4.3.1. An invalid memory access occurs in do_checksum in checksum.c. It can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact (CVE-2019-8381). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8376 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8377 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8381 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/ ======================== Updated packages in core/updates_testing: ======================== tcpreplay-4.3.2-1.mga6 from tcpreplay-4.3.2-1.mga6.src.rpm
Status comment: Fixed upstream in 4.3.2 => (none)Assignee: bugsquad => qa-bugs
The following 2 packages are going to be installed: - meta-task-6-3.3.mga6.noarch - tcpreplay-4.3.2-1.mga6.x86_64 1.3MB of additional disk space will be used. 343KB of packages will be retrieved. I had installed tcpdump. I ran this test against an unencrypted internal ftp server I had laying around. # tcpdump -w dmp1.pcap I did an FTP login and get a file (which is unimportant). Then I did an tcpreplay with # tcpreplay -v --intf1=enp0s3 dmp1.pcap It will then run through the pcap file processing the transactions (do this only to internal servers you are controlling, else you may be considered a hacker). I didn't test the weakness, but the utility is working as designed. I'm approving it.
Whiteboard: (none) => MGA6-64-OKCC: (none) => brtians1
Going with it. Validating. Advisory in Comment 2.
Keywords: (none) => validated_updateCC: (none) => andrewsfarm, sysadmin-bugs
CC: (none) => tmbKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0158.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED