Skip to content

Commit

Permalink
Merge pull request #639 from appneta/Bug_#619_buffer_overflow_get_nex…
Browse files Browse the repository at this point in the history
…t_packet

Bug #619 buffer overflow get_next_packet()
  • Loading branch information
fklassen authored Mar 13, 2021
2 parents 765f012 + e100d14 commit 93b7db1
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 4 deletions.
8 changes: 5 additions & 3 deletions docs/CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,16 +1,18 @@
03/12/2021 Version 4.3.4 Beta1
- Fix gcc 8.3.0 build warnings (#634)
- heap buffer overflow in tcpreplay get_next_packet (#619)
- CVE-2020-24266 heap buffer overflow in tcpprep get_l2len (#617)
- CVE-2020-24265 heap buffer overflow in tcpprep (#616)
- Compile failure on aarch64-linux-android (#612)

05/20/2020 Version 4.3.3
- Increase cache buffers size to accomodate VLAN edits (#594)
- CVE-2018-20553 Correct L2 header length calculations so that IP header offset is correct (#584)
- Correct L2 header length to correct IP header offset (#583)
- Fix warnings from gcc version 10 (#580)
- Heap Buffer Overflow in randomize_iparp (#579)
- Use after free in get_ipv6_next (#578)
- Heap Buffer Overflow in git_ipv6_next (#576)
- CVE-2020-12740 Heap Buffer Overflow in git_ipv6_next (#576)
- Call pcap_freecode() on pcap_compile() (#572)
- Increase max snaplen to 262144 (#571)
- Fix divide by zero in fuzzing (#570)
Expand All @@ -22,7 +24,7 @@
- Remove some duplicated SOURCES entries (#551)
- Expand /dev/bpfX hard limit to fix macOS Mojave (#550)
- Implement --loopdelay-ms when using --loop=0 (#546)
- Heap overflow packet2tree and get_l2len (#530)
- CVE-2018-20552 Heap overflow packet2tree and get_l2len (#530)

03/12/2019 Version 4.3.2
- CVE-2019-8381 memory access in do_checksum() (#538)
Expand Down Expand Up @@ -125,7 +127,7 @@
- Support parallel builds (#259)
- Give user CFLAGS precedence (#256)
- Properly detect Brew install when Xcode is not available (#254)
- Increase max packet size to 65549 (#251)
- CVE-2016-6160 Increase max packet size to 65549 (#251)
- Handle IP headers with zero length (#247)

01/11/2016 Version 4.1.1
Expand Down
2 changes: 1 addition & 1 deletion src/send_packets.c
Original file line number Diff line number Diff line change
Expand Up @@ -1054,7 +1054,7 @@ get_next_packet(tcpreplay_t *ctx, pcap_t *pcap, struct pcap_pkthdr *pkthdr, int

if (*prev_packet != NULL) {
(*prev_packet)->next = NULL;
pktlen = pkthdr->len;
pktlen = pkthdr->caplen;

(*prev_packet)->pktdata = safe_malloc(pktlen + PACKET_HEADROOM);
memcpy((*prev_packet)->pktdata, pktdata, pktlen);
Expand Down

0 comments on commit 93b7db1

Please sign in to comment.