Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 678266 (CVE-2019-8376, CVE-2019-8377, CVE-2019-8381) - <net-analyzer/tcpreplay-4.3.2: multiple vulnerabilities
Summary: <net-analyzer/tcpreplay-4.3.2: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2019-8376, CVE-2019-8377, CVE-2019-8381
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/appneta/tcpreplay/...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-02-18 03:15 UTC by D'juan McDonald (domhnall)
Modified: 2019-04-20 02:27 UTC (History)
1 user (show)

See Also:
Package list:
=net-analyzer/tcpreplay-4.3.2
Runtime testing required: No
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2019-02-18 03:15:10 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2019-8381):

An issue was discovered in Tcpreplay 4.3.1. An invalid memory access occurs in do_checksum in checksum.c. It can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.



Gentoo Security Padawan
(domhnall)
Comment 2 D'juan McDonald (domhnall) 2019-02-18 03:28:49 UTC
Perhaps I should slow down a bit, apologies. These are the CVEs

https://nvd.nist.gov/vuln/detail/CVE-2019-8377
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

https://nvd.nist.gov/vuln/detail/CVE-2019-8376
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_layer4_v6() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
Comment 3 D'juan McDonald (domhnall) 2019-02-18 03:30:39 UTC
Perhaps I should slow down a bit, apologies. These are the CVEs

https://nvd.nist.gov/vuln/detail/CVE-2019-8377
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.

https://nvd.nist.gov/vuln/detail/CVE-2019-8376
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_layer4_v6() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
Comment 4 Larry the Git Cow gentoo-dev 2019-03-12 21:13:05 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=dffabcbf5eaf67bbb49b27ea4bb9d7ca6158f343

commit dffabcbf5eaf67bbb49b27ea4bb9d7ca6158f343
Author:     Jeroen Roovers <jer@gentoo.org>
AuthorDate: 2019-03-12 21:12:04 +0000
Commit:     Jeroen Roovers <jer@gentoo.org>
CommitDate: 2019-03-12 21:13:01 +0000

    net-analyzer/tcpreplay: Version 4.3.2
    
    Bug: https://bugs.gentoo.org/678266
    Package-Manager: Portage-2.3.62, Repoman-2.3.12
    Signed-off-by: Jeroen Roovers <jer@gentoo.org>

 net-analyzer/tcpreplay/Manifest               |  1 +
 net-analyzer/tcpreplay/tcpreplay-4.3.2.ebuild | 74 +++++++++++++++++++++++++++
 2 files changed, 75 insertions(+)
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2019-03-27 02:27:17 UTC
Maintainer(s), please advise if you are ready for stabilization or call for stabilization yourself.
Comment 6 Aaron Bauman (RETIRED) gentoo-dev 2019-04-04 23:07:48 UTC
@arches, please stabilize.
Comment 7 Agostino Sarubbo gentoo-dev 2019-04-05 20:47:50 UTC
amd64 stable
Comment 8 Thomas Deutschmann (RETIRED) gentoo-dev 2019-04-10 17:05:58 UTC
x86 stable
Comment 9 Aaron Bauman (RETIRED) gentoo-dev 2019-04-20 02:27:54 UTC
tree is clean