------------------------------------------------------------------- Tue Oct 8 14:34:01 UTC 2019 - Pedro Monreal Gonzalez - Security update: [bsc#1153098, bsc#1153332] * Buffer overflow/overread vulnerabilities - CVE-2018-14468 (FrameRelay) - CVE-2018-14469 (IKEv1) - CVE-2018-14466 (AFS/RX) - CVE-2018-14461 (LDP) - CVE-2018-14462 (ICMP) - CVE-2018-14465 (RSVP) - CVE-2018-14464 (LMP) - CVE-2019-15166 (LMP) - CVE-2018-14882 (RPL) - CVE-2018-16229 (DCCP) - CVE-2018-14467 (BGP) - CVE-2018-14881 (BGP) - CVE-2018-16230 (BGP) - CVE-2018-16300 (BGP) - CVE-2018-14463 (VRRP) - CVE-2018-16301 (fixed in libpcap) - CVE-2018-16451 (SMB) - CVE-2018-16452 (SMB) - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) - Add patches: * tcpdump-CVE-2018-14468.patch tcpdump-CVE-2018-14469.patch tcpdump-CVE-2018-14466.patch tcpdump-CVE-2018-14461.patch tcpdump-CVE-2018-14462.patch tcpdump-CVE-2018-14465.patch tcpdump-CVE-2018-14464.patch tcpdump-CVE-2019-15166.patch tcpdump-CVE-2018-14882.patch tcpdump-CVE-2018-16229.patch tcpdump-CVE-2018-14467.patch tcpdump-CVE-2018-14881.patch tcpdump-CVE-2018-16230.patch tcpdump-CVE-2018-16300.patch tcpdump-CVE-2018-14463.patch tcpdump-CVE-2018-16451.patch tcpdump-CVE-2018-16452.patch tcpdump-CVE-2018-10103.patch ------------------------------------------------------------------- Tue Oct 1 12:11:23 UTC 2019 - Pedro Monreal Gonzalez - Security fixes: [bsc#1057247] * CVE-2017-12995 DNS parser, could enter an infinite loop due to a bug in print-domain.c * CVE-2017-12893 SMB/CIFS parser, buffer over-read in smbutil.c * CVE-2017-12894 Several protocol parsers, could cause a buffer over-read in addrtoname.c * CVE-2017-12896 ISAKMP parser, buffer over-read in print-isakmp.c * CVE-2017-12897 ISO CLNS parser, buffer over-read in print-isoclns.c * CVE-2017-12898 NFS parser, buffer over-read in print-nfs.c * CVE-2017-12899 DECnet parser, buffer over-read in print-decnet.c * CVE-2017-12900 Several protocol parsers, could cause a buffer over-read in util-print.c * CVE-2017-12901 EIGRP parser, buffer over-read in print-eigrp.c * CVE-2017-12902 Zephyr parser, buffer over-read in print-zephyr.c, several functions. * CVE-2017-12985 IPv6 parser, buffer over-read in print-ip6.c * CVE-2017-12986 IPv6 routing header parser, buffer over-read in print-rt6.c * CVE-2017-12987 IEEE 802.11 parser, buffer over-read in print-802_11.c * CVE-2017-12988 telnet parser, buffer over-read in print-telnet.c * CVE-2017-12991 BGP parser, buffer over-read in print-bgp.c * CVE-2017-12992 RIPng parser, buffer over-read in print-ripng.c * CVE-2017-12993 Juniper protocols parser, buffer over-read in print-juniper.c, several functions. * CVE-2017-12996 PIMv2 parser, buffer over-read in print-pim.c * CVE-2017-12998 IS-IS parser, buffer over-read in print-isoclns.c * CVE-2017-12999 IS-IS parser, buffer over-read in print-isoclns.c * CVE-2017-13001 NFS parser, buffer over-read in print-nfs.c * CVE-2017-13002 AODV parser, buffer over-read in print-aodv.c * CVE-2017-13003 LMP parser, buffer over-read in print-lmp.c * CVE-2017-13004 Juniper protocols parser, buffer over-read in print-juniper.c * CVE-2017-13005 NFS parser, buffer over-read in print-nfs.c * CVE-2017-13006 L2TP parser, buffer over-read in print-l2tp.c, several functions. * CVE-2017-13008 IEEE 802.11 parser, buffer over-read in print-802_11.c * CVE-2017-13009 IPv6 mobility parser, buffer over-read in print-mobility.c * CVE-2017-13010 BEEP parser, buffer over-read in print-beep.c * CVE-2017-13012 ICMP parser, buffer over-read in print-icmp.c * CVE-2017-13013 ARP parser, buffer over-read in print-arp.c, several functions. * CVE-2017-13014 White Board protocol parser, buffer over-read in print-wb.c * CVE-2017-13016 ISO ES-IS parser, buffer over-read in print-isoclns.c * CVE-2017-13017 DHCPv6 parser, buffer over-read in print-dhcp6.c * CVE-2017-13018 PGM parser, buffer over-read in print-pgm.c * CVE-2017-13019 PGM parser, buffer over-read in print-pgm.c * CVE-2017-13021 ICMPv6 parser, buffer over-read in print-icmp6.c * CVE-2017-13022 IP parser, buffer over-read in print-ip.c * CVE-2017-13023 IPv6 mobility parser, buffer over-read in print-mobility.c * CVE-2017-13024 IPv6 mobility parser, buffer over-read in print-mobility.c * CVE-2017-13025 IPv6 mobility parser, buffer over-read in print-mobility.c * CVE-2017-13027 LLDP parser, buffer over-read in print-lldp.c * CVE-2017-13028 BOOTP parser, buffer over-read in print-bootp.c * CVE-2017-13029 PPP parser, buffer over-read in print-ppp.c * CVE-2017-13030 PIM parser, buffer over-read in print-pim.c, several functions. * CVE-2017-13031 IPv6 fragmentation header parser, buffer over-read in print-frag6.c * CVE-2017-13032 RADIUS parser, buffer over-read in print-radius.c * CVE-2017-13034 PGM parser, buffer over-read in print-pgm.c * CVE-2017-13035 ISO IS-IS parser, buffer over-read in print-isoclns.c * CVE-2017-13036 OSPFv3 parser, buffer over-read in print-ospf6.c * CVE-2017-13037 IP parser, buffer over-read in print-ip.c * CVE-2017-13038 PPP parser, buffer over-read in print-ppp.c * CVE-2017-13041 ICMPv6 parser, buffer over-read in print-icmp6.c * CVE-2017-13047 ISO ES-IS parser, buffer over-read in print-isoclns.c * CVE-2017-13048 RSVP parser, buffer over-read in print-rsvp.c * CVE-2017-13049 Rx protocol parser, buffer over-read in print-rx.c * CVE-2017-13051 RSVP parser, buffer over-read in print-rsvp.c * CVE-2017-13053 BGP parser, buffer over-read in print-bgp.c * CVE-2017-13055 ISO IS-IS parser, buffer over-read in print-isoclns.c * CVE-2017-13687 Cisco HDLC parser, buffer over-read in print-chdlc.c * CVE-2017-13688 OLSR parser, buffer over-read in print-olsr.c * CVE-2017-13689 IKEv1 parser, buffer over-read in print-isakmp.c * CVE-2017-13725 IPv6 routing header parser, buffer over-read in print-rt6.c - Add patches: tcpdump-CVE-2017-12995.patch tcpdump-CVE-2017-12893.patch tcpdump-CVE-2017-12894.patch tcpdump-CVE-2017-12896.patch tcpdump-CVE-2017-12897.patch tcpdump-CVE-2017-12898.patch tcpdump-CVE-2017-12899.patch tcpdump-CVE-2017-12900.patch tcpdump-CVE-2017-12901.patch tcpdump-CVE-2017-12902.patch tcpdump-CVE-2017-12985.patch tcpdump-CVE-2017-12986.patch tcpdump-CVE-2017-12987.patch tcpdump-CVE-2017-12988.patch tcpdump-CVE-2017-12991.patch tcpdump-CVE-2017-12992.patch tcpdump-CVE-2017-12993.patch tcpdump-CVE-2017-12996.patch tcpdump-CVE-2017-12998.patch tcpdump-CVE-2017-12999.patch tcpdump-CVE-2017-13001.patch tcpdump-CVE-2017-13002.patch tcpdump-CVE-2017-13003.patch tcpdump-CVE-2017-13004.patch tcpdump-CVE-2017-13005.patch tcpdump-CVE-2017-13006.patch tcpdump-CVE-2017-13008.patch tcpdump-CVE-2017-13009.patch tcpdump-CVE-2017-13010.patch tcpdump-CVE-2017-13012.patch tcpdump-CVE-2017-13013.patch tcpdump-CVE-2017-13014.patch tcpdump-CVE-2017-13016.patch tcpdump-CVE-2017-13017.patch tcpdump-CVE-2017-13018.patch tcpdump-CVE-2017-13019.patch tcpdump-CVE-2017-13021.patch tcpdump-CVE-2017-13022.patch tcpdump-CVE-2017-13023.patch tcpdump-CVE-2017-13024.patch tcpdump-CVE-2017-13025.patch tcpdump-CVE-2017-13027.patch tcpdump-CVE-2017-13028.patch tcpdump-CVE-2017-13029.patch tcpdump-CVE-2017-13030.patch tcpdump-CVE-2017-13031.patch tcpdump-CVE-2017-13032.patch tcpdump-CVE-2017-13034.patch tcpdump-CVE-2017-13035.patch tcpdump-CVE-2017-13036.patch tcpdump-CVE-2017-13037.patch tcpdump-CVE-2017-13038.patch tcpdump-CVE-2017-13041.patch tcpdump-CVE-2017-13047.patch tcpdump-CVE-2017-13048.patch tcpdump-CVE-2017-13049.patch tcpdump-CVE-2017-13051.patch tcpdump-CVE-2017-13053.patch tcpdump-CVE-2017-13055.patch tcpdump-CVE-2017-13687.patch tcpdump-CVE-2017-13688.patch tcpdump-CVE-2017-13689.patch tcpdump-CVE-2017-13725.patch ------------------------------------------------------------------- Thu Sep 6 13:29:04 UTC 2018 - pmonrealgonzalez@suse.com - Patch fix: [bsc#1094241, CVE-2016-7975] * The patch to fix CVE-2016-7975 use a variable before its definition and does not show all NFS related operations. * Added tcpdump-CVE-2016-7975_1_of_3_fix.patch ------------------------------------------------------------------- Mon Oct 2 11:14:12 UTC 2017 - pmonrealgonzalez@suse.com - Security fixes: [bsc#1057247] * Buffer over-read in safeputs() [CVE-2017-11541] * Buffer over-read in PIMv1 decoder [CVE-2017-11542] * Buffer overflow in SLIP decoder [CVE-2017-11543] * Buffer overflow in several protocol parsers [CVE-2017-13011] - Added patches: * tcpdump-CVE-2017-11542.patch * tcpdump-CVE-2017-11541.patch * tcpdump-CVE-2017-11543.patch * tcpdump-3.9.8-CVE-2017-13011.patch ------------------------------------------------------------------- Tue Jul 25 13:02:26 UTC 2017 - pmonrealgonzalez@suse.com - Security fix: * Crafted input allows remote DoS [CVE-2017-11108, bsc#1047873] * Added patch tcpdump-3.9.8-CVE-2017-11108.patch ------------------------------------------------------------------- Fri Mar 3 10:33:40 UTC 2017 - pmonrealgonzalez@suse.com - Security updates in SLE-11 (bsc#1020940): * CVE-2016-7922: Corrected buffer overflow in AH parser print-ah.c:ah_print(). - Minor modifications in extract.h, interface.h, print-ip.c and print-ip6.c. - Commit1 3cb7e038251aae998d0581933b4f9df252106334 - Commit2 e57b260be429af93d6217c8e79a2f863551332bf * CVE-2016-7923: Corrected buffer overflow in ARP parser print-arp.c:arp_print(). - Commit 64f6392084ec0768b8afc04612eac0a458bc5e0d * CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser print-sl.c:sl_if_print(). - Commit c4744fc29aefea62ab751d50d5e4743c3065ef5f * CVE-2016-7926: Corrected buffer overflow in the Ethernet parser print-ether.c:ethertype_print(). - Commit 8be5413f3a168bd9913ac7ab348404f5af54dd42 * CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser print-802_11.c:ieee802_11_radio_print(). - Commit da946bdc6c4a6f8adaaef67f93d95f499a9cb145 * CVE-2016-7928: Corrected buffer overflow in the IPComp parser print-ipcomp.c:ipcomp_print(). - Commit a36c495ef49f96d41cd39caa5283aa6c4c32fd8b * CVE-2016-7931: Corrected buffer overflow in the MPLS parser print-mpls.c:mpls_print(). - Commit 69ead2a09cf7d0666c6a7ac12e47fd9743242c61 * CVE-2016-7936: Corrected buffer overflow in the UDP parser print-udp.c:udp_print(). - Commit cb696b8e91d9860dd30ec3b7dcb16424cd6e18ac * CVE-2016-7937: Corrected segmentation faults - Commit cb922d07cce6574874b954555ebad4338748087b - Contains CVE-2016-7934 and CVE-2016-7935 - patches in function udp_print() - Add more bounds checks in VAT, RTP and RTCP printers * CVE-2016-7939: Corrected buffer overflows in GRE parser print-gre.c:(multiple functions) - Commit 237efcf593ee369519e9dfdc9166702219dabfec * CVE-2016-7940: Corrected buffer overflows in STP parser print-stp.c:(multiple functions) - Commit 968776fbf5cd65c7ea2168912bd9f4379727eb11 - Function stp_print_spb_bpdu() does not exist in SLE11 version * CVE-2016-7973: Corrected buffer overflow in AppleTalk parser print-atalk.c - Commit1 b56aab38621915a192be3fab9334207a12b1cb9a - Commit2 5356a9ea6903b835185eda83e8a17d6e4e990fb5 * CVE-2016-7974: Corrected buffer overflow in IP parser print-ip.c:(multiple functions) - Commit1 e8a77162825188bd31eb96c99dc8e4432a2c6531 - Commit2 39988398861a5fe3f2a89d1f3ff55ad0f7be770b - Commit3 98f666f243759373773f08f8a91d42cc6f8c3e50 * CVE-2016-7975: Corrected buffer overflow in TCP parser print-tcp.c:tcp_print() - Commit1 ec88d36bcd0d6d0c706d9120183fc73e769a0ad5 * CVE-2016-7984: Corrected buffer overflow in TFTP parser print-tftp.c:tftp_print() - Contains CVE-2016-7983 - Commit 7bf069c2517690262aacbddc437731af991b31a7 - New function fn_printztn() included in util.c - Files affected print-tftp.c, print-bootp.c, util.c and interface.h * CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser print-cip.c - Commit 4ef024c8e94459e3ab9afae90e1948406e1d04db * CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) - Commit d07e352f5a8a9cbf7e8f3ed49a316ed906353fd8 - File util-print.c does not exits, modifications included in util.c - Files involved interface.h, util.c, print-pim.c, print-lwres.c, print-igmp.c, print-hsrp.c and print-dvmrp.c * CVE-2016-8574: Corrected buffer overflow in FRF.15 parser print-fr.c:frf15_print() - Commit cc79646a9d793423cc0c0080d14bf1df53d366e8 * CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print() - Commit 909fb30769e92d3f432b41d3eea3c0623bc03c84 * CVE-2017-5203: Corrected buffer overflow in BOOTP parser print-bootp.c:bootp_print() - Commit 496be87393765efd1e62b29df100ea3c7a718972 * CVE-2017-5204: Corrected buffer overflow in IPv6 parser print-ip6.c:ip6_print() - Commit d6913f7e3fc6d3084ab64d179853468e58cdca4b * CVE-2017-5483: Corrected buffer overflow in SNMP parser print-snmp.c:asn1_parse() - Commit eec1624f7be88008f519d92150ee0eb85633518b * CVE-2017-5484: Corrected buffer overflow in ATM parser print-atm.c:sig_print() - Commit: 5d214e36eed3565fbdc0f9b527bbc33a6bb63972 * CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser addrtoname.c:lookup_nsap() - Commit2: 2817174698bcd5371ff7fbc9d50b5241dd0130bd * CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser print-isoclns.c:clnp_print() - Commit2: b553848e3e2c0c466f65ab14e253af91467e561a ------------------------------------------------------------------- Thu Mar 19 13:58:26 UTC 2015 - vcizek@suse.com - security update: * CVE-2015-0261: issues with IPv6 mobility printer (bnc#922220) * CVE-2014-9140: issue with PPP printer (bnc#923142) * CVE-2015-2154: issue with ethernet printer (bnc#922222) - added patches: * tcpdump-CVE-2014-9140.patch * 0001-print-shouldbe-checksum-for-broken-OSI-checksum-remo.patch * 0002-test-case-files-for-CVE-2015-2153-2154-2155.patch * 0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch ------------------------------------------------------------------- Wed Jan 14 16:14:07 UTC 2015 - bkutil@suse.com - Backport support for lldp (bnc#912943) (fate#318387) - Add lldp subtypes support ------------------------------------------------------------------- Thu Dec 11 16:43:39 UTC 2014 - vcizek@suse.com - fix CVE-2014-8767 (bnc#905870) * denial of service in verbose mode using malformed OLSR payload * added tcpdump-CVE-2014-8767.patch - fix CVE-2014-8769 (bnc#905872) * unreliable output using malformed AOVD payload * added tcpdump-CVE-2014-8769.patch * added 0001-Clean-up-error-message-printing.patch ------------------------------------------------------------------- Tue Jan 8 18:04:02 CET 2008 - prusnak@suse.cz - updated to 3.9.8 * Rework ARP printer * Rework OSPFv3 printer * Add support for Frame-Relay ARP * Decode DHCP Option 121 (RFC 3442 Classless Static Route) * Decode DHCP Option 249 (MS Classless Static Route) the same as Option 121 * TLV: Add support for Juniper .pcap extensions * Print EGP header in new-world-order style * Converted print-isakmp.c to NETDISSECT * Moved AF specific stuff into af.h * Test subsystem now table driven, and saves outputs and diffs to one place * Require for pf definitions - allows reading of pflog formatted libpcap files on an OS other than where the file was generated ------------------------------------------------------------------- Thu Jul 26 16:03:44 CEST 2007 - prusnak@suse.cz - updated to 3.9.7 * NFS: Print unsigned values as such * RX: parse safely * BGP: fixes for IPv6-less builds * 801.1ag: use standard codepoint * use /dev/bpf on systems with such a device * 802.11: print QoS data, avoid dissect of no-data frame, ignore padding * smb: make sure that we haven't gone past the end of the captured data * smb: squelch an uninitialized complaint from coverity * NFS: from NetBSD; don't interpret the reply as a possible NFS reply if it got MSG_DENIED * BGP: don't print TLV values that didn't fit, from www.digit-labs.org * revised INSTALL.txt about libpcap dependancy - dropped obsolete patch: * bgp-overflow.diff (fixed in update) * 802_11-overflow.diff (included in update) - changed libpcap to libpcap-devel in BuildRequires ------------------------------------------------------------------- Thu Jul 12 11:37:08 CEST 2007 - prusnak@suse.cz - update to 3.9.6 * added support for: - OIF RSVP Extensions UNI 1.0 Rev. 2 and additional RSVP objects - Message-id NACK c-type - 802.3ah loopback ctrl msg - Multiple-STP as per 802.1s - rapid-SPT as per 802.1w - CFM Link-trace msg, Link-trace-Reply msg, - unidirectional link detection - the olsr protocol as per RFC 3626 plus the LQ extensions from olsr.org - variable-length checksum in DCCP, as per section 9 of RFC 4340 - per-VLAN spanning tree and per-VLAN rapid spanning tree - Multiple-STP as per 802.1s - the cisco propriatry 'dynamic trunking protocol' - the cisco proprietary VTP protocol - additional values in pflog * changes to both TCP and IP Printer Output * fixed a potential buffer overflow in the 802.11 printer * print basic info about a few more Cisco LAN protocols * mDNS cleanup * ICMP MPLS rework of the extension code * use the correct codepoint for the OSPF simple text auth token entry * use safeputs to print the password * update dhcp6 options table as per IETF standardization activities - fixed overflow in bgp (bgp-overflow.patch) [#291356] ------------------------------------------------------------------- Fri Mar 2 11:44:35 CET 2007 - prusnak@suse.cz - fixed one byte overflow (802_11-overflow.diff) [#250163] ------------------------------------------------------------------- Wed Jan 3 15:43:19 CET 2007 - prusnak@suse.cz - update to 3.9.5 * Fixes for 64bit compiling * Updated list of DNS RR typecodes * Add basic support for keyed authentication TCP option * Fix printing for 4.4BSD/NetBSD NFS Filehandles * Add support for: - Frame-Relay ARP - parsing Juniper .pcap files - FRF.16 Multilink Frame-Relay (DLT_MFR) - PIMv2 checksum verification - further dissection of the IPCP Compression Option - Cisco's proposed VQP protocol - Cisco style NLPID encapsulation - PPP over Frame-Relay - Address-Withdraw and Label-Withdraw Msgs - BFD Discriminator TLV - BGP signaled VPLS ------------------------------------------------------------------- Wed Jan 25 21:42:01 CET 2006 - mls@suse.de - converted neededforbuild to BuildRequires ------------------------------------------------------------------- Thu Jan 12 20:17:27 CET 2006 - mjancar@suse.cz - compile with -fstack-protector ------------------------------------------------------------------- Mon Jan 9 17:30:29 CET 2006 - mjancar@suse.cz - update to 3.9.4 - drop obsolete patches * tcpdump-3.9.4-overflow.diff ------------------------------------------------------------------- Thu Sep 1 14:50:13 CEST 2005 - mjancar@suse.cz - enable support for TSO packets (#114159) ------------------------------------------------------------------- Fri Aug 5 08:59:48 CEST 2005 - cthiel@suse.de - fixed buffer overflow in addrtoname.c:499 ------------------------------------------------------------------- Tue Aug 2 19:43:32 CEST 2005 - mjancar@suse.cz - update to 3.9.3 ------------------------------------------------------------------- Thu Aug 05 13:11:52 CEST 2004 - postadal@suse.cz - updated to version 3.8.3 - removed obsoleted patches (isakmp-fix2, isakmp-fix3, radius-fix) ------------------------------------------------------------------- Mon Mar 29 17:44:10 CEST 2004 - postadal@suse.cz - fixed overflow in ISAKMP (CAN-2004-0183) [#36828] ------------------------------------------------------------------- Fri Feb 6 09:32:15 CET 2004 - ro@suse.de - fix configure.in (test for pcap_debug was broken) ------------------------------------------------------------------- Tue Jan 20 15:42:46 CET 2004 - postadal@suse.cz - updated to version 3.8.1 * fixed security bug in L2TP (CAN-2003-1029) - removed obsoleted patches (isakmp-buffer-overflow-fix, compile) - fixed security bugs in these parsers: RADIUS (CAN-2004-0055), ISAKMP (CAN-2004-0057) [#33763] ------------------------------------------------------------------- Sat Jan 10 17:26:25 CET 2004 - adrian@suse.de - build as user ------------------------------------------------------------------- Tue Jan 06 14:12:36 CET 2004 - postadal@suse.cz - fixed two remotely exploitable buffer overflows in the ISAKMP parser [#33763] (CAN-2003-0989) ------------------------------------------------------------------- Thu Jul 24 14:03:01 CEST 2003 - postadal@suse.cz - updated to version 3.7.2 - removed obsoleted patches (tcpdump-nfs-fix, tcpdump-isakmp, tcpdump-bgp) ------------------------------------------------------------------- Wed May 7 16:08:11 CEST 2003 - ro@suse.de - make it compile with current glibc headers (move include of netinet/in.h further up) ------------------------------------------------------------------- Wed Mar 05 15:22:20 CET 2003 - postadal@suse.cz - fixed security bugs in parsing ISAKMP, BGP and NFS ------------------------------------------------------------------- Tue Oct 1 12:04:37 CEST 2002 - froh@suse.de - s390/s390x: dumping of qeth interfaces needs some filtering, which is accomplished by the new 'tcpdump-qeth' (#15626, #22085) ------------------------------------------------------------------- Mon May 20 13:12:35 CEST 2002 - postadal@suse.de - fixed bug in displaying NFS traffic - updated to version 3.7.1 * support more protocols * better Linux libc5 compat ------------------------------------------------------------------- Wed Apr 3 17:05:07 CEST 2002 - postadal@suse.cz - fixed to compile with autoconf-2.53 ------------------------------------------------------------------- Mon Jun 18 11:09:57 CEST 2001 - cihlar@suse.cz - updated to version 3.6.2 - removed obsolete patches - compile against package libpcap ------------------------------------------------------------------- Tue Feb 6 12:02:52 CET 2001 - ro@suse.de - tcpclice.c: include time.h - smbutil.c: include time.h ------------------------------------------------------------------- Fri Jan 19 00:35:14 PST 2001 - bk@suse.de - Turn off PACKET_RX_RING too. It is not available in lx_sus22 and not enabled in our 2.4 kernel configs and causes a warning on every start and possible trouble. See bug #5178 ------------------------------------------------------------------- Thu Jan 11 20:01:29 CET 2001 - ak@suse.de - Turn off PACKET_TRECV. It's not enabled in our kernel and causes some problems. ------------------------------------------------------------------- Fri Nov 24 17:31:36 CET 2000 - ak@suse.de - Add mb() for ppc ------------------------------------------------------------------- Tue Nov 14 13:00:34 CET 2000 - ro@suse.de - groups sorted ------------------------------------------------------------------- Tue Nov 14 12:09:19 MET 2000 - ak@suse.de - add some protocols to make it build on 6.1 again ------------------------------------------------------------------- Mon Nov 13 18:19:49 MET 2000 - ak@suse.de - add membar fix for sparc ------------------------------------------------------------------- Sat Nov 11 20:10:43 MET 2000 - ak@suse.de - fix some buffer overflows. ------------------------------------------------------------------- Thu May 18 17:46:34 CEST 2000 - schwab@suse.de - Fix missing declaration. - Fix broken includes. - Get rid of Makefile.Linux and clean up spec file. - Update config.{sub,guess}. ------------------------------------------------------------------- Thu May 11 13:41:14 CEST 2000 - ak@suse.de - add security fix for endless dns looping. From Guy Harris. ------------------------------------------------------------------- Thu Mar 2 12:38:44 CET 2000 - ak@suse.de - move man pages to /usr/share/man ------------------------------------------------------------------- Wed Dec 22 14:24:46 CET 1999 - ak@suse.de - fix promiscuous mode bug ------------------------------------------------------------------- Fri Dec 3 21:45:44 CET 1999 - bk@suse.de - disabled NO_SMP_DEBUG changes by ank(did not compile on sparc) ------------------------------------------------------------------- Sat Nov 6 16:22:35 CET 1999 - bk@suse.de - Integrated changes from ak: strip tcpdump and a fix a -p crash bug (pcap-maddr-fix) ------------------------------------------------------------------- Wed Oct 27 04:52:43 CEST 1999 - bk@suse.de - Andi Kleen added patches from Alexey Kuznetsov. Features e.g.: - device independent libpcap, Kernel support for new link-layers, e.g. ISDN (libpcap uses PF_PACKET,SOCK_DGRAM instead of PF_INET,SOCK_PACKET) - IPv6 and APM support, SMB updates - libpcap support for "In Kernel Packet Filtering" (CONFIG_FILTER) - made a libpcapn subpackage which holds the new libpcap for developers. - Added fix to reestablish old output format of tcpdump from Andi Kleen. ------------------------------------------------------------------- Mon Sep 13 17:23:57 CEST 1999 - bs@suse.de - ran old prepare_spec on spec file to switch to new prepare_spec. ------------------------------------------------------------------- Tue Sep 29 10:03:04 MEST 1998 - ro@suse.de - print_i4l : include net/ethernet.h instead of netinet/if_ether.h for glibc ---------------------------------------------------------------------------- Mon Mar 2 16:58:50 MET 1998 - florian@suse.de - update to version 3.4a6 ---------------------------------------------------------------------------- Mon Jul 7 13:17:08 CEST 1997 - florian@suse.de - update to version 3.4a5 - added isdn-patches ---------------------------------------------------------------------------- Mon Jul 7 13:17:08 CEST 1997 - florian@suse.de - update to version 3.4a3 ---------------------------------------------------------------------------- Sun Apr 13 23:04:29 MEST 1997 - florian@suse.de - update to new version 3.3.1a2 with automatic detection of packet types ---------------------------------------------------------------------------- Sun Nov 10 22:17:10 CET 1996 - florian@suse.de - added the changes distributed with samba - added isdn patches