Bug 33013 - tcpreplay new security issues CVE-2023-4256 and CVE-2023-43279
Summary: tcpreplay new security issues CVE-2023-4256 and CVE-2023-43279
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-03-25 16:44 CET by Nicolas Salguero
Modified: 2024-03-28 04:54 CET (History)
4 users (show)

See Also:
Source RPM: tcpreplay-4.4.3-2.mga9.src.rpm
CVE: CVE-2023-4256, CVE-2023-43279
Status comment:


Attachments

Description Nicolas Salguero 2024-03-25 16:44:26 CET
Fedora has issue an advisory on March 24:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHUILQV2YJI5TXXXJA5FQ2HJQGFT7NTN/

Mageia 9 is also affected.
Nicolas Salguero 2024-03-25 16:45:01 CET

CVE: (none) => CVE-2023-4256, CVE-2023-43279
Whiteboard: (none) => MGA9TOO
Source RPM: (none) => tcpreplay-4.4.4-1.mga10.src.rpm

Nicolas Salguero 2024-03-25 16:45:18 CET

Status comment: (none) => Patches available from Fedora

Comment 1 Lewis Smith 2024-03-25 20:26:10 CET
I can never find Fedora patches, but they must exist. Assigning globally in the absence of an obvious ackagerp.

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Salguero 2024-03-26 11:24:20 CET
Suggested advisory:
========================

The updated package fixes security vulnerabilities:

Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the tcpedit_dlt_cleanup() function within plugins/dlt_plugins.c. This vulnerability can be exploited by supplying a specifically crafted file to the tcprewrite binary. This flaw enables a local attacker to initiate a Denial of Service (DoS) attack. (CVE-2023-4256)

Null Pointer Dereference in mask_cidr6 component at cidr.c in Tcpreplay 4.4.4 allows attackers to crash the application via crafted tcprewrite command. (CVE-2023-43279)

References:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHUILQV2YJI5TXXXJA5FQ2HJQGFT7NTN/
========================

Updated package in core/updates_testing:
========================
tcpreplay-4.4.3-2.1.mga9

from SRPM:
tcpreplay-4.4.3-2.1.mga9.src.rpm

Status: NEW => ASSIGNED
Whiteboard: MGA9TOO => (none)
Version: Cauldron => 9
Assignee: pkg-bugs => qa-bugs
Source RPM: tcpreplay-4.4.4-1.mga10.src.rpm => tcpreplay-4.4.3-2.mga9.src.rpm
Status comment: Patches available from Fedora => (none)

PC LX 2024-03-26 16:29:28 CET

CC: (none) => mageia

katnatek 2024-03-26 18:06:14 CET

Keywords: (none) => advisory

Comment 3 Herman Viaene 2024-03-27 15:38:00 CET
MGA9-64 Plasma Wayland on HP-Pavillion
No installation issues.
Ref bug 27489 Comment 3 for testing after installing tcpdump:
# tcpdump -w netdump1.pcap
tcpdump: listening on wlp0s20u2, link-type EN10MB (Ethernet), snapshot length 262144 bytes
^C8709 packets captured
8711 packets received by filter
0 packets dropped by kernel

$ tcprewrite --infile=netdump1.pcap --outfile=new.pcap
$ ls -als *.pcap
6460 -rw-r--r-- 1 root    root    6611782 Mar 27 15:27 netdump1.pcap
6460 -rw-r--r-- 1 tester9 tester9 6611782 Mar 27 15:28 new.pcap
$ tcpreplay --listnics
Warning: May need to run as root to get access to all network interfaces.
Warning: May need to run as root to get access to all network interfaces.
Available network interfaces:
wlp0s20u2
any
wlo1
bluetooth0
bluetooth-monitor
nflog
nfqueue

# tcpreplay -v -i wlp0s20u2 new.pcap 
reading from file -, link-type EN10MB (Ethernet), snapshot length 65535
15:26:08.1711549568 34:31:c4:80:a9:b4 > ff:ff:ff:ff:ff:ff, ethertype Unknown (0x88e1), length 60: 
        0x0000:  0000 a000 b052 1c32 5477 0000 0000 0000  .....R.2Tw......
        0x0010:  0000 0000 0000 0000 0000 0000 0000 0000  ................
        0x0020:  0000 0000 0000 0000 0000 0000 0000       ..............
15:26:08.1711549568 34:31:c4:80:a9:b4 > ff:ff:ff:ff:ff:ff, ethertype Unknown (0x8912), length 60: 
        0x0000:  0170 a000 0000 1f84 32a3 97a2 5553 bef1  .p......2...US..
        0x0010:  fcf9 796b 5214 13e9 e200 0000 0000 0000  ..ykR...........
        0x0020:  0000 0000 0000 0000 0000 0000 0000       ..............
and a load more 
and at the end
Actual: 11 packets (660 bytes) sent in 9.70 seconds
Rated: 67.9 Bps, 0.000 Mbps, 1.13 pps
Statistics for network device: wlp0s20u2
        Successful packets:        10
        Failed packets:            0
        Truncated packets:         0
        Retried packets (ENOBUFS): 0
        Retried packets (EAGAIN):  0

OK to go.

Whiteboard: (none) => MGA9-64-OK
CC: (none) => herman.viaene

Comment 4 Thomas Andrews 2024-03-28 00:52:31 CET
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 5 Mageia Robot 2024-03-28 04:54:16 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0098.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.