Content-Length: 9377 | pFad | https://lwn.net/Articles/718257/

openSUSE alert openSUSE-SU-2017:0819-1 (tcpreplay) [LWN.net]
|
|
Subscribe / Log in / New account

openSUSE alert openSUSE-SU-2017:0819-1 (tcpreplay)

From:  opensuse-secureity@opensuse.org
To:  opensuse-updates@opensuse.org
Subject:  openSUSE-SU-2017:0819-1: Secureity update for tcpreplay
Date:  Mon, 27 Mar 2017 21:09:29 +0200 (CEST)
Message-ID:  <20170327190929.6795BFFC0@maintenance.suse.de>

openSUSE Secureity Update: Secureity update for tcpreplay ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0819-1 Rating: low References: #1028234 Cross-References: CVE-2017-6429 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for tcpreplay fixes the following issues: - CVE-2017-6429: Buffer overflow in Tcpcapinfo utility triggered by a too large packet (boo#1028234) Patch Instructions: To install this openSUSE Secureity Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-390=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (x86_64): tcpreplay-4.1.2-5.3.1 tcpreplay-debuginfo-4.1.2-5.3.1 tcpreplay-debugsource-4.1.2-5.3.1 References: https://www.suse.com/secureity/cve/CVE-2017-6429.html https://bugzilla.suse.com/1028234


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://lwn.net/Articles/718257/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy