- update to 4.99.3:
* Updated printers:
PTP: Use the proper values for the control field and print un-allocated
values for the message field as "Reserved" instead of "none".
* Source code:
smbutil.c: Replace obsolete function call (asctime)
* Documentation:
Reformat the installation notes (INSTALL.txt) in Markdown.
Convert CONTRIBUTING to Markdown.
CONTRIBUTING.md: Document the use of "protocol: " in a commit summary.
Add a README file for NetBSD.
Fix CMake build to set man page section numbers in tcpdump.1
OBS-URL: https://build.opensuse.org/request/show/1058821
OBS-URL: https://build.opensuse.org/package/show/network:utilities/tcpdump?expand=0&rev=64
- Fix excess of precission in floating point registers for i586
until resolved upstream.
- Update to 4.99.0
IMPORTANT: Upsteam moved the default install directory to bindir.
For compatibility, tcpdump is still being installed in
sbindir and a symlink in bindir has been added.
* Print unsupported link-layer protocol packets in hex.
* Add support for new network protocols and DLTs: Arista, Autosar
SOME/IP, Broadcom LI and Ethernet switches tag, IEEE 802.15.9,
IP-over-InfiniBand (IPoIB), Linux SLL2, Linux vsockmon, MACsec,
Marvell Distributed Switch Architecture, OpenFlow 1.3, Precision
Time Protocol (PTP), SSH, WHOIS, ZigBee Encapsulation Protocol (ZEP).
* Make protocol-specific updates for: AH, DHCP, DNS, ESP, FRF.16,
HNCP, ICMP6, IEEE 802.15.4, IPv6, IS-IS, Linux SLL, LLDP, LSP
ping, MPTCP, NFS, NSH, NTP, OSPF, OSPF6, PGM, PIM, PPTP, RADIUS,
RSVP, Rx, SMB, UDLD, VXLAN-GPE.
* User interface:
- Make SLL2 the default for Linux "any" pseudo-device.
- Add --micro and --nano shorthands.
- Add --count to print a counter only instead of decoding.
- Add --print, to cause packet printing even with -w.
- Add support for remote capture if libpcap supports it.
- Flush the output packet buffer on a SIGUSR2.
- Handle very large -f files by rejecting them.
* Source code:
- Introduce new helper functions, including GET_*(),
nd_print_protocol(), nd_print_invalid(), nd_print_trunc(),
nd_trunc_longjmp() and others.
- Put integer signedness right in many cases.
OBS-URL: https://build.opensuse.org/request/show/873794
OBS-URL: https://build.opensuse.org/package/show/network:utilities/tcpdump?expand=0&rev=58
- Disabled ikev2pI2 test that fails on some architectures
* Added patch tcpdump-ikev2pI2.patch
- Update to version 4.9.2 [bsc#1057247]
* Security fixes:
- CVE-2017-11108 segfault in STP decoder
- Segfault in ESP decoder with OpenSSL 1.1
- CVE-2017-11543 buffer overflow in SLIP decoder
- CVE-2017-13011 buffer overflow in bittok2str_internal()
- CVE-2017-12989 infinite loop in the RESP parser
- CVE-2017-12990 infinite loop in the ISAKMP parser
- CVE-2017-12995 infinite loop in the DNS parser
- CVE-2017-12997 infinite loop in the LLDP parser
- CVE-2017-11541 buffer over-read in safeputs()
- CVE-2017-11542 buffer over-read in PIMv1 decoder
- CVE-2017-12893 buffer over-read in the SMB/CIFS parser
- CVE-2017-12894 buffer over-read in several protocol parsers
- CVE-2017-12895 buffer over-read in the ICMP parser
- CVE-2017-12896 buffer over-read in the ISAKMP parser
- CVE-2017-12897 buffer over-read in the ISO CLNS parser
- CVE-2017-12898 buffer over-read in the NFS parser
- CVE-2017-12899 buffer over-read in the DECnet parser
- CVE-2017-12900 buffer over-read in the in several protocol parsers
- CVE-2017-12901 buffer over-read in the EIGRP parser
- CVE-2017-12902 buffer over-read in the Zephyr parser
- CVE-2017-12985 buffer over-read in the IPv6 parser
- CVE-2017-12986 buffer over-read in the IPv6 routing header parser
- CVE-2017-12987 buffer over-read in the 802.11 parser
- CVE-2017-12988 buffer over-read in the telnet parser
- CVE-2017-12991 buffer over-read in the BGP parser
OBS-URL: https://build.opensuse.org/request/show/524782
OBS-URL: https://build.opensuse.org/package/show/network:utilities/tcpdump?expand=0&rev=43
- Disable ikev2pI2 test that fails on ppc, ppc64 and ppc64le
* Added patch tcpdump-ikev2pI2-test-fails-ppc.patch
- Update to version 4.9.1 [bsc#1047873]
* CVE-2017-11108/Fix bounds checking for STP.
* Make assorted documentation updates and fix a few typos in output.
* Fixup -C for file size >2GB
* Show AddressSanitizer presence in version output.
* Fix a bug in test scripts.
* Fix a use-after-free when the requested interface does not exist.
OBS-URL: https://build.opensuse.org/request/show/512662
OBS-URL: https://build.opensuse.org/package/show/network:utilities/tcpdump?expand=0&rev=37
- version update to 4.9.0 bsc#1020940
* CVE-2016-7922 The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
* CVE-2016-7923 The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
* CVE-2016-7924 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().
* CVE-2016-7925 The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
* CVE-2016-7926 The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
* CVE-2016-7927 The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
* CVE-2016-7928 The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
* CVE-2016-7929 The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().
* CVE-2016-7930 The LLC parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().
* CVE-2016-7931 The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
* CVE-2016-7932 The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().
* CVE-2016-7933 The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
* CVE-2016-7934 The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
* CVE-2016-7935 The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
* CVE-2016-7936 The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
* CVE-2016-7937 The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
* CVE-2016-7938 The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().
* CVE-2016-7939 The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
* CVE-2016-7940 The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
* CVE-2016-7973 The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
* CVE-2016-7974 The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
* CVE-2016-7975 The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
* CVE-2016-7983 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
* CVE-2016-7984 The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
* CVE-2016-7985 The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().
* CVE-2016-7986 The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.
* CVE-2016-7992 The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
* CVE-2016-7993 A bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
* CVE-2016-8574 The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
OBS-URL: https://build.opensuse.org/request/show/454244
OBS-URL: https://build.opensuse.org/package/show/network:utilities/tcpdump?expand=0&rev=35