Bug 2389579 (CVE-2025-9157) - CVE-2025-9157 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c untrunc_packet use after free
Summary: CVE-2025-9157 tcpreplay: appneta tcpreplay tcprewrite edit_packet.c untrunc_p...
Keywords:
Status: NEW
Alias: CVE-2025-9157
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2389866 2389867 2389868
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-08-19 21:01 UTC by OSIDB Bzimport
Modified: 2025-08-21 15:07 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-08-19 21:01:46 UTC
A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da. Applying a patch is advised to resolve this issue.


Note You need to log in before you can comment on or make changes to this bug.