Hello community,

here is the log from the commit of package tcpdump for openSUSE:Factory checked 
in at 2017-03-05 17:53:32
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/tcpdump (Old)
 and      /work/SRC/openSUSE:Factory/.tcpdump.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "tcpdump"

Sun Mar  5 17:53:32 2017 rev:34 rq:454247 version:4.9.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/tcpdump/tcpdump.changes  2016-04-30 
23:25:33.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.tcpdump.new/tcpdump.changes     2017-03-05 
17:53:33.340548329 +0100
@@ -1,0 +2,46 @@
+Thu Feb  2 14:47:56 UTC 2017 - [email protected]
+
+- version update to 4.9.0 bsc#1020940
+  * CVE-2016-7922 The AH parser in tcpdump before 4.9.0 has a buffer overflow 
in print-ah.c:ah_print().
+  * CVE-2016-7923 The ARP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-arp.c:arp_print().
+  * CVE-2016-7924 The ATM parser in tcpdump before 4.9.0 has a buffer overflow 
in print-atm.c:oam_print().
+  * CVE-2016-7925 The compressed SLIP parser in tcpdump before 4.9.0 has a 
buffer overflow in print-sl.c:sl_if_print().
+  * CVE-2016-7926 The Ethernet parser in tcpdump before 4.9.0 has a buffer 
overflow in print-ether.c:ethertype_print().
+  * CVE-2016-7927 The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer 
overflow in print-802_11.c:ieee802_11_radio_print().
+  * CVE-2016-7928 The IPComp parser in tcpdump before 4.9.0 has a buffer 
overflow in print-ipcomp.c:ipcomp_print().
+  * CVE-2016-7929 The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a 
buffer overflow in print-juniper.c:juniper_parse_header().
+  * CVE-2016-7930 The LLC parser in tcpdump before 4.9.0 has a buffer overflow 
in print-llc.c:llc_print().
+  * CVE-2016-7931 The MPLS parser in tcpdump before 4.9.0 has a buffer 
overflow in print-mpls.c:mpls_print().
+  * CVE-2016-7932 The PIM parser in tcpdump before 4.9.0 has a buffer overflow 
in print-pim.c:pimv2_check_checksum().
+  * CVE-2016-7933 The PPP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-ppp.c:ppp_hdlc_if_print().
+  * CVE-2016-7934 The RTCP parser in tcpdump before 4.9.0 has a buffer 
overflow in print-udp.c:rtcp_print().
+  * CVE-2016-7935 The RTP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-udp.c:rtp_print().
+  * CVE-2016-7936 The UDP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-udp.c:udp_print().
+  * CVE-2016-7937 The VAT parser in tcpdump before 4.9.0 has a buffer overflow 
in print-udp.c:vat_print().
+  * CVE-2016-7938 The ZeroMQ parser in tcpdump before 4.9.0 has an integer 
overflow in print-zeromq.c:zmtp1_print_frame().
+  * CVE-2016-7939 The GRE parser in tcpdump before 4.9.0 has a buffer overflow 
in print-gre.c, multiple functions.
+  * CVE-2016-7940 The STP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-stp.c, multiple functions.
+  * CVE-2016-7973 The AppleTalk parser in tcpdump before 4.9.0 has a buffer 
overflow in print-atalk.c, multiple functions.
+  * CVE-2016-7974 The IP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-ip.c, multiple functions.
+  * CVE-2016-7975 The TCP parser in tcpdump before 4.9.0 has a buffer overflow 
in print-tcp.c:tcp_print().
+  * CVE-2016-7983 The BOOTP parser in tcpdump before 4.9.0 has a buffer 
overflow in print-bootp.c:bootp_print().
+  * CVE-2016-7984 The TFTP parser in tcpdump before 4.9.0 has a buffer 
overflow in print-tftp.c:tftp_print().
+  * CVE-2016-7985 The CALM FAST parser in tcpdump before 4.9.0 has a buffer 
overflow in print-calm-fast.c:calm_fast_print().
+  * CVE-2016-7986 The GeoNetworking parser in tcpdump before 4.9.0 has a 
buffer overflow in print-geonet.c, multiple functions.
+  * CVE-2016-7992 The Classical IP over ATM parser in tcpdump before 4.9.0 has 
a buffer overflow in print-cip.c:cip_if_print().
+  * CVE-2016-7993 A bug in util-print.c:relts_print() could cause a buffer 
overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight 
resolver protocol, PIM).
+  * CVE-2016-8574 The FRF.15 parser in tcpdump before 4.9.0 has a buffer 
overflow in print-fr.c:frf15_print().
+  * CVE-2016-8575 The Q.933 parser in tcpdump before 4.9.0 has a buffer 
overflow in print-fr.c:q933_print().
+  * CVE-2017-5202 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer 
overflow in print-isoclns.c:clnp_print().
+  * CVE-2017-5203 The BOOTP parser in tcpdump before 4.9.0 has a buffer 
overflow in print-bootp.c:bootp_print().
+  * CVE-2017-5204 The IPv6 parser in tcpdump before 4.9.0 has a buffer 
overflow in print-ip6.c:ip6_print().
+  * CVE-2017-5205 The ISAKMP parser in tcpdump before 4.9.0 has a buffer 
overflow in print-isakmp.c:ikev2_e_print().
+  * CVE-2017-5341 The OTV parser in tcpdump before 4.9.0 has a buffer overflow 
in print-otv.c:otv_print().
+  * CVE-2017-5342 In tcpdump before 4.9.0 a bug in multiple protocol parsers 
(Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in 
print-ether.c:ether_print().
+  * CVE-2017-5482 The Q.933 parser in tcpdump before 4.9.0 has a buffer 
overflow in print-fr.c:q933_print().
+  * CVE-2017-5483 The SNMP parser in tcpdump before 4.9.0 has a buffer 
overflow in print-snmp.c:asn1_parse().
+  * CVE-2017-5484 The ATM parser in tcpdump before 4.9.0 has a buffer overflow 
in print-atm.c:sig_print().
+  * CVE-2017-5485 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer 
overflow in addrtoname.c:lookup_nsap().
+  * CVE-2017-5486 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer 
overflow in print-isoclns.c:clnp_print(). 
+
+-------------------------------------------------------------------

Old:
----
  tcpdump-4.7.4.tar.gz
  tcpdump-4.7.4.tar.gz.sig

New:
----
  tcpdump-4.9.0.tar.gz
  tcpdump-4.9.0.tar.gz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ tcpdump.spec ++++++
--- /var/tmp/diff_new_pack.QTTtoN/_old  2017-03-05 17:53:33.904468513 +0100
+++ /var/tmp/diff_new_pack.QTTtoN/_new  2017-03-05 17:53:33.908467946 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package tcpdump
 #
-# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -16,11 +16,9 @@
 #
 
 
-# from http://upstream-tracker.org/versions/libpcap.html
-# for pcap_set_tstamp_precision()
-%define min_libpcap_version 1.7.2
+%define min_libpcap_version 1.8.1
 Name:           tcpdump
-Version:        4.7.4
+Version:        4.9.0
 Release:        0
 Summary:        A Packet Sniffer
 License:        BSD-3-Clause
@@ -50,7 +48,7 @@
 make %{?_smp_mflags}
 
 %install
-make DESTDIR=%{buildroot} install %{?_smp_mflags}
+%make_install
 %ifarch s390 s390x
   install -D -m 755 %{SOURCE1} %{buildroot}%{_sbindir}
 %endif
@@ -62,7 +60,7 @@
 %files
 %defattr(-,root,root)
 %doc CHANGES CREDITS LICENSE README* *.awk
-%doc %{_mandir}/man?/*
+%{_mandir}/man?/*
 %{_sbindir}/tcpdump
 %ifarch s390 s390x
 %{_sbindir}/tcpdump-qeth

++++++ tcpdump-4.7.4.tar.gz -> tcpdump-4.9.0.tar.gz ++++++
++++ 56263 lines of diff (skipped)



Reply via email to