tcppreplay is vulnerable to heap-based buffer overflow. The vulnerability exists in the get_l2len_protocol
in get.c
which allows an attacker to cause buffer overflows.
github.com/appneta/tcpreplay/issues/716
lists.fedoraproject.org/archives/list/[email protected]/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/
lists.fedoraproject.org/archives/list/[email protected]/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/
lists.fedoraproject.org/archives/list/[email protected]/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/
security-tracker.debian.org/tracker/CVE-2022-27941
security.gentoo.org/glsa/202210-08