MGASA-2022-0345

Source
https://advisories.mageia.org/MGASA-2022-0345.html
Import Source
https://advisories.mageia.org/MGASA-2022-0345.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0345
Related
Published
2022-09-26T06:22:36Z
Modified
2022-09-26T05:28:15Z
Summary
Updated tcpreplay packages fix security vulnerability
Details

tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in getlayer4v6 in common/get.c. (CVE-2022-27939)

tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in getipv6next in common/get.c. (CVE-2022-27940)

tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in getl2lenprotocol in common/get.c. (CVE-2022-27941)

tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls in common/get.c. (CVE-2022-27942)

Tcpreplay version 4.4.1 contains a memory leakage flaw in fixipv6checksums() function. The highest threat from this vulnerability is to data confidentiality. (CVE-2022-28487)

The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in getipv6next at common/get.c:713. (CVE-2022-37047)

The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in getl2lenprotocol at common/get.c:344. (CVE-2022-37048)

The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in parse_mpls at common/get.c:150. (CVE-2022-37049)

References
Credits

Affected packages

Mageia:8 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:rpm/mageia/tcpreplay?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.2-1.mga8

Ecosystem specific

{
    "section": "core"
}