pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/net/tcpreplay



Module Name:    pkgsrc
Committed By:   nia
Date:           Sun Jun 21 15:30:39 UTC 2020

Modified Files:
        pkgsrc/net/tcpreplay: Makefile distinfo
Added Files:
        pkgsrc/net/tcpreplay/patches: patch-configure
Removed Files:
        pkgsrc/net/tcpreplay/patches: patch-libopts_makeshell.c
            patch-src_common_get.c patch-src_common_mac.c

Log Message:
tcpreplay: Update to 4.3.3

05/20/2020 Version 4.3.3
    - Increase cache buffers size to accomodate VLAN edits (#594)
    - Correct L2 header length to correct IP header offset (#583)
    - Fix warnings from gcc version 10 (#580)
    - Heap Buffer Overflow in randomize_iparp (#579)
    - Use after free in get_ipv6_next (#578)
    - Heap Buffer Overflow in git_ipv6_next (#576)
    - Call pcap_freecode() on pcap_compile() (#572)
    - Increase max snaplen to 262144 (#571)
    - Fix divide by zero in fuzzing (#570)
    - Unique IP repeats at very high iteration counts (#566)
    - Fails to compile on FreeBSD amd64 13.0 (#558)
    - Heap Buffer Overflow in do_checksum (#556) (#577)
    - Attempt to correct corrupt pcap files, if possible (#557)
    - Fix GCC v10 warnings (#555)
    - Remove some duplicated SOURCES entries (#551)
    - Expand /dev/bpfX hard limit to fix macOS Mojave (#550)
    - Implement --loopdelay-ms when using --loop=0 (#546)
    - Heap overflow packet2tree and get_l2len (#530)

03/12/2019 Version 4.3.2
    - CVE-2019-8381 memory access in do_checksum() (#538)
    - CVE-2019-8376 NULL pointer dereference get_layer4_v6() (#537)
    - CVE-2019-8377 NULL pointer dereference get_ipv6_l4proto() (#536)
    - Rename Ethereal to Wireshark (#545)

12/27/2018 Version 4.3.1
    - Fix checkspell detected typos (#531)

11/10/2018 Version 4.3.0
    - Fix maxOS TOS checksum failure (#524)
    - TCP sequence edits seeding (#514)
    - Fix issues identifed by Codacy (#493)
    - CVE-2018-18408 use-after-free in post_args (#489)
    - CVE-2018-18407 heap-buffer-overflow csum_replace4 (#488)
    - CVE-2018-17974 heap-buffer-overflow dlt_en10mb_encode (#486)
    - CVE-2018-17580 heap-buffer-overflow fast_edit_packet (#485)
    - CVE-2018-17582 heap-buffer-overflow in get_next_packet (#484)
    - Out-of-tree build (#482)
    - CVE-2018-13112 heap-buffer-overflow in get_l2len (#477 dup #408)
    - Closing stdin on pipe (#479)
    - Second pcap file hangs on multiplier option (#472)
    - Jumbo frame support for fragroute option (#466)
    - TCP sequence edit ACK corruption (#451)
    - TCP sequence number edit initial SYN packet should have zero ACK (#450)
    - Travis CI build fails due to new build images (#432)
    - Upgrade libopts to 5.18.12 to address version build issues (#430)
    - Add ability to change tcp SEQ/ACK numbers (#425)
    - Hang using loop and netmap options (#424)
    - tcpprep -S not working for large cache files (#423)
    - Unable to tcprewrite range of ports with --portmap (#422)
    - --maxsleep broken for values less than 1000 (#421)
    - -T flag breaks traffic replay timing (#419)
    - Respect 2nd packet timing (#418)
    - Avoid non-blocking behaviour when using STDIN (#416)
    - pcap containing >1020 packets produces invalid cache file (#415)
    - manpage typos (#413)
    - Fails to open tap0 on Zephyr (#411)
    - Heap-buffer-overflow in get_l2protocol (#410)
    - Heap-buffer-overflow in packet2tree (#409)
    - Heap-buffer-overflow in get_l2len (#408)
    - Heap-buffer-overflow in flow_decode (#407)
    - Rewrite zero IP total length field to match the actual packet length (#406)
    - Stack-buffer-overflow in tcpcapinfo (#405)
    - tcpprep --include option does not exclude (#404)
    - Negative-size-param memset in dlt_radiotap_get_80211 (#402)
    - tcpeplay --verbose option not working (#398)
    - Fix replay when using --with-testnic (#178)


To generate a diff of this commit:
cvs rdiff -u -r1.25 -r1.26 pkgsrc/net/tcpreplay/Makefile
cvs rdiff -u -r1.13 -r1.14 pkgsrc/net/tcpreplay/distinfo
cvs rdiff -u -r0 -r1.1 pkgsrc/net/tcpreplay/patches/patch-configure
cvs rdiff -u -r1.1 -r0 pkgsrc/net/tcpreplay/patches/patch-libopts_makeshell.c \
    pkgsrc/net/tcpreplay/patches/patch-src_common_get.c \
    pkgsrc/net/tcpreplay/patches/patch-src_common_mac.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/net/tcpreplay/Makefile
diff -u pkgsrc/net/tcpreplay/Makefile:1.25 pkgsrc/net/tcpreplay/Makefile:1.26
--- pkgsrc/net/tcpreplay/Makefile:1.25  Sun Jan 26 17:31:56 2020
+++ pkgsrc/net/tcpreplay/Makefile       Sun Jun 21 15:30:39 2020
@@ -1,9 +1,10 @@
-# $NetBSD: Makefile,v 1.25 2020/01/26 17:31:56 rillig Exp $
+# $NetBSD: Makefile,v 1.26 2020/06/21 15:30:39 nia Exp $
 
-VERSION=       4.2.6
-DISTNAME=      tcpreplay-${VERSION}
+DISTNAME=      tcpreplay-4.3.3
 CATEGORIES=    net
-MASTER_SITES=  ${MASTER_SITE_GITHUB:=appneta/tcpreplay/releases/download/v${VERSION}/}
+MASTER_SITES=  ${MASTER_SITE_GITHUB:=appneta/}
+GITHUB_RELEASE=        v${PKGVERSION_NOREV}
+EXTRACT_SUFX=  .tar.xz
 
 MAINTAINER=    pkgsrc-users%NetBSD.org@localhost
 HOMEPAGE=      https://tcpreplay.appneta.com/

Index: pkgsrc/net/tcpreplay/distinfo
diff -u pkgsrc/net/tcpreplay/distinfo:1.13 pkgsrc/net/tcpreplay/distinfo:1.14
--- pkgsrc/net/tcpreplay/distinfo:1.13  Mon Dec  4 09:32:01 2017
+++ pkgsrc/net/tcpreplay/distinfo       Sun Jun 21 15:30:39 2020
@@ -1,9 +1,7 @@
-$NetBSD: distinfo,v 1.13 2017/12/04 09:32:01 he Exp $
+$NetBSD: distinfo,v 1.14 2020/06/21 15:30:39 nia Exp $
 
-SHA1 (tcpreplay-4.2.6.tar.gz) = 8f7b91534d7936ae534d87689ad371fd4e4bb059
-RMD160 (tcpreplay-4.2.6.tar.gz) = afdbd71573d04afbe7f6594778e9dd1223b64ff0
-SHA512 (tcpreplay-4.2.6.tar.gz) = a46846b29e3cd7fbc635faee9c4be90db0d346c0d0f291ac8e007e1fbf614289094e14480c1c5b40feb5a175d3cbad018e2dd4d1a5762b7d31a4325af6102e7e
-Size (tcpreplay-4.2.6.tar.gz) = 3494827 bytes
-SHA1 (patch-libopts_makeshell.c) = 1da67df9acb4ac7972ed72db5b113bfee054aeae
-SHA1 (patch-src_common_get.c) = 71685be82d53faa5f1e73afcddb540506055e41e
-SHA1 (patch-src_common_mac.c) = e667846485bb1d07065f98cc685a318ee04873ec
+SHA1 (tcpreplay-4.3.3.tar.xz) = 23ffd5e382d55bb0ed27c7becb196c7565fcaf6b
+RMD160 (tcpreplay-4.3.3.tar.xz) = b159ff5fe5d6e4e126932c155bf9680047d19972
+SHA512 (tcpreplay-4.3.3.tar.xz) = 110d7768a176d2126766829466a209cdd983afcf0c988f7e128baa5057b3ac1dc918fcaeb168a2e6654429100a146afcbdafcda8c3d67adf6b17892a48689a02
+Size (tcpreplay-4.3.3.tar.xz) = 748220 bytes
+SHA1 (patch-configure) = acafd832ae7d94520daf9600a18f3419bd440e1e

Added files:

Index: pkgsrc/net/tcpreplay/patches/patch-configure
diff -u /dev/null pkgsrc/net/tcpreplay/patches/patch-configure:1.1
--- /dev/null   Sun Jun 21 15:30:39 2020
+++ pkgsrc/net/tcpreplay/patches/patch-configure        Sun Jun 21 15:30:39 2020
@@ -0,0 +1,15 @@
+$NetBSD: patch-configure,v 1.1 2020/06/21 15:30:39 nia Exp $
+
+Shell portability.
+
+--- configure.orig     2020-06-14 22:29:09.000000000 +0000
++++ configure
+@@ -18537,7 +18537,7 @@ $as_echo_n "checking for autogen version
+             test ${AUTOGEN_MAJOR} -lt 5 ; then
+         { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
+ $as_echo "no" >&6; }
+-        if test "x$enable_local_libopts" == "xno"; then
++        if test "x$enable_local_libopts" = "xno"; then
+             as_fn_error $? "${AUTOGEN} is too old (${AUTOGEN_VERSION}) for building from source code. Upgrade to 5.18.4 or higher" "$LINENO" 5
+         fi
+         AUTOGEN_VERSION="${AUTOGEN_VERSION} - downlevel"



Home | Main Index | Thread Index | Old Index