diff options
| author | Archana Polampalli <archana.polampalli@windriver.com> | 2025-10-08 16:18:29 +0530 |
|---|---|---|
| committer | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-10-17 10:51:26 +0200 |
| commit | 0538af085a47b038e369db9872ffed8945b200c2 (patch) | |
| tree | 6cf18c579a29b123af7cb09ee095e5dbb99787a7 /meta-networking/recipes-devtools/python | |
| parent | bf223a6c9a6ec21c6f1a790f1071492ab3019956 (diff) | |
| download | meta-openembedded-0538af085a47b038e369db9872ffed8945b200c2.tar.gz | |
tcpreplay: fix CVE-2025-9157
A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2.
The impacted element is the function untrunc_packet of the file
src/tcpedit/edit_packet.c of the component tcprewrite. Executing
manipulation can lead to use after free. It is possible to launch
the attack on the local host. The exploit has been publicly disclosed
and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da.
Applying a patch is advised to resolve this issue.
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-networking/recipes-devtools/python')
0 files changed, 0 insertions, 0 deletions
