tcpreplay 4.4.4-1build2 source package in Ubuntu

Changelog

tcpreplay (4.4.4-1build2) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- William Grant <email address hidden>  Mon, 01 Apr 2024 19:24:42 +1100

Upload details

Uploaded by:
William Grant
Uploaded to:
Noble
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe net
Noble release universe net

Downloads

File Size SHA-256 Checksum
tcpreplay_4.4.4.orig.tar.xz 730.8 KiB 3ff9753cc43bb15e77832cee657e3030dbcdd957fa247e6abacc605689e24051
tcpreplay_4.4.4.orig.tar.xz.asc 516 bytes 2229530fa4586e0a896e962029b8eef7ae8691c3774f4cbc151ab70f2a30b1c1
tcpreplay_4.4.4-1build2.debian.tar.xz 8.3 KiB 1921cf4213b7c775d6c97f7072aee65d3d9455fa8c90b100a850c661f6484349
tcpreplay_4.4.4-1build2.dsc 2.2 KiB 2ce881a7939420b25a3a5c8bf77f3f35c6e1506bf61aaf81f6cce4aaa03b26b3

Available diffs

View changes file

Binary packages built by this source

tcpreplay: Tool to replay saved tcpdump files at arbitrary speeds

 Tcpreplay is aimed at testing the performance of a NIDS by
 replaying real background network traffic in which to hide
 attacks. Tcpreplay allows you to control the speed at which the
 traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 programmatically-generated artificial traffic which doesn't
 exercise the application/protocol inspection that a NIDS performs,
 and doesn't reproduce the real-world anomalies that appear on
 production networks (asymmetric routes, traffic bursts/lulls,
 fragmentation, retransmissions, etc.), tcpreplay allows for exact
 replication of real traffic seen on real networks. It included the following
 executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 based captures are possible.

tcpreplay-dbgsym: debug symbols for tcpreplay