./net/tcpdump, Network monitoring tool

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 4.9.3, Package name: tcpdump-4.9.3, Maintainer: pkgsrc-users

A tool for network monitoring and data acquisition. This software was
originally developed by the Network Research Group at the Lawrence
Berkeley National Laboratory. The original distribution is available
via anonymous ftp to ftp.ee.lbl.gov, in tcpdump.tar.Z. More recent
development is performed at tcpdump.org, http://www.tcpdump.org/

Required to run:
[net/libpcap] [security/openssl]

Required to build:

Package options: ssl

Master sites:

SHA1: 59b309f3620ac4b709de2eaf7bf3a83bf04bc048
RMD160: d4221366c15321acaaa15f178f8a00bfd4e84598
Filesize: 2278.437 KB

Version history: (Expand)

CVS history: (Expand)

   2020-06-14 21:35:38 by Adam Ciarcinski | Files touched by this commit (1)
Log message:
tcpdump: requires libpcap>=1.9.1
   2020-02-25 11:07:53 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
tcpdump: updated to 4.9.3

Summary for 4.9.3 tcpdump release
  Fix buffer overflow/overread vulnerabilities:
    CVE-2017-16808 (AoE)
    CVE-2018-14468 (FrameRelay)
    CVE-2018-14469 (IKEv1)
    CVE-2018-14470 (BABEL)
    CVE-2018-14466 (AFS/RX)
    CVE-2018-14461 (LDP)
    CVE-2018-14462 (ICMP)
    CVE-2018-14465 (RSVP)
    CVE-2018-14881 (BGP)
    CVE-2018-14464 (LMP)
    CVE-2018-14463 (VRRP)
    CVE-2018-14467 (BGP)
    CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled)
    CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled)
    CVE-2018-14880 (OSPF6)
    CVE-2018-16451 (SMB)
    CVE-2018-14882 (RPL)
    CVE-2018-16227 (802.11)
    CVE-2018-16229 (DCCP)
    CVE-2018-16301 (was fixed in libpcap)
    CVE-2018-16230 (BGP)
    CVE-2018-16452 (SMB)
    CVE-2018-16300 (BGP)
    CVE-2018-16228 (HNCP)
    CVE-2019-15166 (LMP)
    CVE-2019-15167 (VRRP)
  Fix for cmdline argument/local issues:
    CVE-2018-14879 (tcpdump -V)
   2020-01-26 18:32:28 by Roland Illig | Files touched by this commit (981)
Log message:
all: migrate homepages from http to https

pkglint -r --network --only "migrate"

As a side-effect of migrating the homepages, pkglint also fixed a few
indentations in unrelated lines. These and the new homepages have been
checked manually.
   2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836)
Log message:
*: Recursive revision bump for openssl 1.1.1.
   2020-01-16 14:33:51 by Jonathan Perkin | Files touched by this commit (12)
Log message:
*: Remove USE_OLD_DES_API.

OpenSSL 1.1.1d no longer ships des_old.h, and the time for this being
necessary appears to be behind us.
   2017-09-08 13:10:41 by Thomas Klausner | Files touched by this commit (3) | Package updated
Log message:
Updated tcpdump to 4.9.2.

Sunday September 3, 2017 denis@ovsienko.info
  Summary for 4.9.2 tcpdump release
    Do not use getprotobynumber() for protocol name resolution.  Do not do
      any protocol name resolution if -n is specified.
    Improve errors detection in the test scripts.
    Fix a segfault with OpenSSL 1.1 and improve OpenSSL usage.
    Clean up IS-IS printing.
    Fix buffer overflow vulnerabilities:
      CVE-2017-11543 (SLIP)
      CVE-2017-13011 (bittok2str_internal)
    Fix infinite loop vulnerabilities:
      CVE-2017-12989 (RESP)
      CVE-2017-12990 (ISAKMP)
      CVE-2017-12995 (DNS)
      CVE-2017-12997 (LLDP)
    Fix buffer over-read vulnerabilities:
      CVE-2017-11541 (safeputs)
      CVE-2017-11542 (PIMv1)
      CVE-2017-12893 (SMB/CIFS)
      CVE-2017-12894 (lookup_bytestring)
      CVE-2017-12895 (ICMP)
      CVE-2017-12896 (ISAKMP)
      CVE-2017-12897 (ISO CLNS)
      CVE-2017-12898 (NFS)
      CVE-2017-12899 (DECnet)
      CVE-2017-12900 (tok2strbuf)
      CVE-2017-12901 (EIGRP)
      CVE-2017-12902 (Zephyr)
      CVE-2017-12985 (IPv6)
      CVE-2017-12986 (IPv6 routing headers)
      CVE-2017-12987 (IEEE 802.11)
      CVE-2017-12988 (telnet)
      CVE-2017-12991 (BGP)
      CVE-2017-12992 (RIPng)
      CVE-2017-12993 (Juniper)
      CVE-2017-11542 (PIMv1)
      CVE-2017-11541 (safeputs)
      CVE-2017-12994 (BGP)
      CVE-2017-12996 (PIMv2)
      CVE-2017-12998 (ISO IS-IS)
      CVE-2017-12999 (ISO IS-IS)
      CVE-2017-13000 (IEEE 802.15.4)
      CVE-2017-13001 (NFS)
      CVE-2017-13002 (AODV)
      CVE-2017-13003 (LMP)
      CVE-2017-13004 (Juniper)
      CVE-2017-13005 (NFS)
      CVE-2017-13006 (L2TP)
      CVE-2017-13007 (Apple PKTAP)
      CVE-2017-13008 (IEEE 802.11)
      CVE-2017-13009 (IPv6 mobility)
      CVE-2017-13010 (BEEP)
      CVE-2017-13012 (ICMP)
      CVE-2017-13013 (ARP)
      CVE-2017-13014 (White Board)
      CVE-2017-13015 (EAP)
      CVE-2017-11543 (SLIP)
      CVE-2017-13016 (ISO ES-IS)
      CVE-2017-13017 (DHCPv6)
      CVE-2017-13018 (PGM)
      CVE-2017-13019 (PGM)
      CVE-2017-13020 (VTP)
      CVE-2017-13021 (ICMPv6)
      CVE-2017-13022 (IP)
      CVE-2017-13023 (IPv6 mobility)
      CVE-2017-13024 (IPv6 mobility)
      CVE-2017-13025 (IPv6 mobility)
      CVE-2017-13026 (ISO IS-IS)
      CVE-2017-13027 (LLDP)
      CVE-2017-13028 (BOOTP)
      CVE-2017-13029 (PPP)
      CVE-2017-13030 (PIM)
      CVE-2017-13031 (IPv6 fragmentation header)
      CVE-2017-13032 (RADIUS)
      CVE-2017-13033 (VTP)
      CVE-2017-13034 (PGM)
      CVE-2017-13035 (ISO IS-IS)
      CVE-2017-13036 (OSPFv3)
      CVE-2017-13037 (IP)
      CVE-2017-13038 (PPP)
      CVE-2017-13039 (ISAKMP)
      CVE-2017-13040 (MPTCP)
      CVE-2017-13041 (ICMPv6)
      CVE-2017-13042 (HNCP)
      CVE-2017-13043 (BGP)
      CVE-2017-13044 (HNCP)
      CVE-2017-13045 (VQP)
      CVE-2017-13046 (BGP)
      CVE-2017-13047 (ISO ES-IS)
      CVE-2017-13048 (RSVP)
      CVE-2017-13049 (Rx)
      CVE-2017-13050 (RPKI-Router)
      CVE-2017-13051 (RSVP)
      CVE-2017-13052 (CFM)
      CVE-2017-13053 (BGP)
      CVE-2017-13054 (LLDP)
      CVE-2017-13055 (ISO IS-IS)
      CVE-2017-13687 (Cisco HDLC)
      CVE-2017-13688 (OLSR)
      CVE-2017-13689 (IKEv1)
      CVE-2017-13690 (IKEv2)
      CVE-2017-13725 (IPv6 routing headers)

Sunday July 23, 2017 denis@ovsienko.info
  Summary for 4.9.1 tcpdump release
    CVE-2017-11108/Fix bounds checking for STP.
    Make assorted documentation updates and fix a few typos in tcpdump output.
    Fixup -C for file size >2GB (GH #488).
    Show AddressSanitizer presence in version output.
    Fix a bug in test scripts (exposed in GH #613).
    On FreeBSD adjust Capsicum capabilities for netmap.
    On Linux fix a use-after-free when the requested interface does not exist.
   2017-03-09 04:59:17 by Maya Rashish | Files touched by this commit (1) | Package updated
Log message:
tcpdump: bump PKGREVISION for previous.

I think the package might be created and can be built, but isn't possible
to pkg_add. paranoid bump just in case.
   2017-03-09 04:01:54 by Maya Rashish | Files touched by this commit (1)
Log message:
tcpdump: create _tcpdump user (and group) properly.
fix build failure when a _tcpdump user did not exist already.

from Michael-John Turner in PR pkg/52051