tcptraceroute 1.5beta7+debian-4.1build2 source package in Ubuntu

Changelog

tcptraceroute (1.5beta7+debian-4.1build2) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- William Grant <email address hidden>  Mon, 01 Apr 2024 19:22:32 +1100

Upload details

Uploaded by:
William Grant
Uploaded to:
Noble
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe net
Noble release universe net

Downloads

File Size SHA-256 Checksum
tcptraceroute_1.5beta7+debian.orig.tar.gz 116.8 KiB fd1a01dceda12ec8a95aa22178a434cd5d92d0854ee54056b54410695c795e71
tcptraceroute_1.5beta7+debian-4.1build2.debian.tar.xz 7.4 KiB 319904b55b0fba5d0fc7ea0d3a57ded16c914bb02de6df11d77498d316653253
tcptraceroute_1.5beta7+debian-4.1build2.dsc 2.0 KiB c0ab4a3fd4d0736419d8f7c05d9fa8732f5cd36fdd9ed2f45c83ecf6c5cb816d

View changes file

Binary packages built by this source

tcptraceroute: traceroute implementation using TCP packets

 The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets
 with a TTL of one, and increments the TTL until the destination has been
 reached. By printing the gateways that generate ICMP time exceeded messages
 along the way, it is able to determine the path packets are taking to reach the
 destination.
 .
 The problem is that with the widespread use of firewalls on the modern
 Internet, many of the packets that traceroute(8) sends out end up being
 filtered, making it impossible to completely trace the path to the destination.
 However, in many cases, these firewalls will permit inbound TCP packets to
 specific ports that hosts sitting behind the firewall are listening for
 connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO
 packets, tcptraceroute is able to bypass the most common firewall filters.

tcptraceroute-dbgsym: debug symbols for tcptraceroute