Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

tcpdump-4.9.2-lp150.1.2 RPM for ppc64le

From OpenSuSE Ports Leap 15.0 for ppc64le

Name: tcpdump Distribution: openSUSE Leap 15.0
Version: 4.9.2 Vendor: openSUSE
Release: lp150.1.2 Build date: Wed May 9 05:58:46 2018
Group: Productivity/Networking/Diagnostic Build host: obs-power8-05
Size: 1501950 Source RPM: tcpdump-4.9.2-lp150.1.2.src.rpm
Packager: https://bugs.opensuse.org
Url: http://www.tcpdump.org/
Summary: A Packet Sniffer
This program can "read" all or only certain packets going over the
ethernet. It can be used to debug specific network problems.

Provides

Requires

License

BSD-3-Clause

Changelog

* Tue Sep 12 2017 pmonrealgonzalez@suse.com
  - Disabled ikev2pI2 test that fails on some architectures
    * Added patch tcpdump-ikev2pI2.patch
* Tue Sep 12 2017 pmonrealgonzalez@suse.com
  - Update to version 4.9.2 [bsc#1057247]
    * Security fixes:
    - CVE-2017-11108 segfault in STP decoder
    - Segfault in ESP decoder with OpenSSL 1.1
    - CVE-2017-11543 buffer overflow in SLIP decoder
    - CVE-2017-13011 buffer overflow in bittok2str_internal()
    - CVE-2017-12989 infinite loop in the RESP parser
    - CVE-2017-12990 infinite loop in the ISAKMP parser
    - CVE-2017-12995 infinite loop in the DNS parser
    - CVE-2017-12997 infinite loop in the LLDP parser
    - CVE-2017-11541 buffer over-read in safeputs()
    - CVE-2017-11542 buffer over-read in PIMv1 decoder
    - CVE-2017-12893 buffer over-read in the SMB/CIFS parser
    - CVE-2017-12894 buffer over-read in several protocol parsers
    - CVE-2017-12895 buffer over-read in the ICMP parser
    - CVE-2017-12896 buffer over-read in the ISAKMP parser
    - CVE-2017-12897 buffer over-read in the ISO CLNS parser
    - CVE-2017-12898 buffer over-read in the NFS parser
    - CVE-2017-12899 buffer over-read in the DECnet parser
    - CVE-2017-12900 buffer over-read in the in several protocol parsers
    - CVE-2017-12901 buffer over-read in the EIGRP parser
    - CVE-2017-12902 buffer over-read in the Zephyr parser
    - CVE-2017-12985 buffer over-read in the IPv6 parser
    - CVE-2017-12986 buffer over-read in the IPv6 routing header parser
    - CVE-2017-12987 buffer over-read in the 802.11 parser
    - CVE-2017-12988 buffer over-read in the telnet parser
    - CVE-2017-12991 buffer over-read in the BGP parser
    - CVE-2017-12992 buffer over-read in the RIPng parser
    - CVE-2017-12993 buffer over-read in the Juniper protocols parser
    - CVE-2017-12994 buffer over-read in the BGP parser
    - CVE-2017-12996 buffer over-read in the PIMv2 parser
    - CVE-2017-12998 buffer over-read in the IS-IS parser
    - CVE-2017-12999 buffer over-read in the IS-IS parser
    - CVE-2017-13000 buffer over-read in the IEEE 802.15.4 parser
    - CVE-2017-13001 buffer over-read in the NFS parser
    - CVE-2017-13002 buffer over-read in the AODV parser
    - CVE-2017-13003 buffer over-read in the LMP parser
    - CVE-2017-13004 buffer over-read in the Juniper protocols parser
    - CVE-2017-13005 buffer over-read in the NFS parser
    - CVE-2017-13006 buffer over-read in the L2TP parser
    - CVE-2017-13007 buffer over-read in the Apple PKTAP parser
    - CVE-2017-13008 buffer over-read in the IEEE 802.11 parser
    - CVE-2017-13009 buffer over-read in the IPv6 mobility parser
    - CVE-2017-13010 buffer over-read in the BEEP parser
    - CVE-2017-13012 buffer over-read in the ICMP parser
    - CVE-2017-13013 buffer over-read in the ARP parser
    - CVE-2017-13014 buffer over-read in the White Board protocol parser
    - CVE-2017-13015 buffer over-read in the EAP parser
    - CVE-2017-13016 buffer over-read in the ISO ES-IS parser
    - CVE-2017-13017 buffer over-read in the DHCPv6 parser
    - CVE-2017-13018 buffer over-read in the PGM parser
    - CVE-2017-13019 buffer over-read in the PGM parser
    - CVE-2017-13020 buffer over-read in the VTP parser
    - CVE-2017-13021 buffer over-read in the ICMPv6 parser
    - CVE-2017-13022 buffer over-read in the IP parser
    - CVE-2017-13023 buffer over-read in the IPv6 mobility parser
    - CVE-2017-13024 buffer over-read in the IPv6 mobility parser
    - CVE-2017-13025 buffer over-read in the IPv6 mobility parser
    - CVE-2017-13026 buffer over-read in the ISO IS-IS parser
    - CVE-2017-13027 buffer over-read in the LLDP parser
    - CVE-2017-13028 buffer over-read in the BOOTP parser
    - CVE-2017-13029 buffer over-read in the PPP parser
    - CVE-2017-13030 buffer over-read in the PIM parser
    - CVE-2017-13031 buffer over-read in the IPv6 fragmentation header parser
    - CVE-2017-13032 buffer over-read in the RADIUS parser
    - CVE-2017-13033 buffer over-read in the VTP parser
    - CVE-2017-13034 buffer over-read in the PGM parser
    - CVE-2017-13035 buffer over-read in the ISO IS-IS parser
    - CVE-2017-13036 buffer over-read in the OSPFv3 parser
    - CVE-2017-13037 buffer over-read in the IP parser
    - CVE-2017-13038 buffer over-read in the PPP parser
    - CVE-2017-13039 buffer over-read in the ISAKMP parser
    - CVE-2017-13040 buffer over-read in the MPTCP parser
    - CVE-2017-13041 buffer over-read in the ICMPv6 parser
    - CVE-2017-13042 buffer over-read in the HNCP parser
    - CVE-2017-13043 buffer over-read in the BGP parser
    - CVE-2017-13044 buffer over-read in the HNCP parser
    - CVE-2017-13045 buffer over-read in the VQP parser
    - CVE-2017-13046 buffer over-read in the BGP parser
    - CVE-2017-13047 buffer over-read in the ISO ES-IS parser
    - CVE-2017-13048 buffer over-read in the RSVP parser
    - CVE-2017-13049 buffer over-read in the Rx protocol parser
    - CVE-2017-13050 buffer over-read in the RPKI-Router parser
    - CVE-2017-13051 buffer over-read in the RSVP parser
    - CVE-2017-13052 buffer over-read in the CFM parser
    - CVE-2017-13053 buffer over-read in the BGP parser
    - CVE-2017-13054 buffer over-read in the LLDP parser
    - CVE-2017-13055 buffer over-read in the ISO IS-IS parser
    - CVE-2017-13687 buffer over-read in the Cisco HDLC parser
    - CVE-2017-13688 buffer over-read in the OLSR parser
    - CVE-2017-13689 buffer over-read in the IKEv1 parser
    - CVE-2017-13690 buffer over-read in the IKEv2 parser
    - CVE-2017-13725 buffer over-read in the IPv6 routing header parser
    * Dropped patch tcpdump-reverted-test-scripts-fix.patch
* Wed Aug 23 2017 pmonrealgonzalez@suse.com
  - Reverted upstream commit that makes some tests to fail when
    compiling with openssl-1.1.0
    * Upstream commit 68cc39dd64688829be2632d9cd24f7efa3da79bb
    * Added patch tcpdump-reverted-test-scripts-fix.patch
    * Removed patch tcpdump-ikev2pI2-test-fails-ppc.patch
* Wed Jul 26 2017 pmonrealgonzalez@suse.com
  - Disable ikev2pI2 test that fails on ppc, ppc64 and ppc64le
    * Added patch tcpdump-ikev2pI2-test-fails-ppc.patch
* Wed Jul 26 2017 pmonrealgonzalez@suse.com
  - Update to version 4.9.1 [bsc#1047873]
    * CVE-2017-11108/Fix bounds checking for STP.
    * Make assorted documentation updates and fix a few typos in output.
    * Fixup -C for file size >2GB
    * Show AddressSanitizer presence in version output.
    * Fix a bug in test scripts.
    * Fix a use-after-free when the requested interface does not exist.
* Thu Feb 02 2017 pmonrealgonzalez@suse.com
  - version update to 4.9.0 bsc#1020940
    * CVE-2016-7922 The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
    * CVE-2016-7923 The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
    * CVE-2016-7924 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().
    * CVE-2016-7925 The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
    * CVE-2016-7926 The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
    * CVE-2016-7927 The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
    * CVE-2016-7928 The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
    * CVE-2016-7929 The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().
    * CVE-2016-7930 The LLC parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().
    * CVE-2016-7931 The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
    * CVE-2016-7932 The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().
    * CVE-2016-7933 The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
    * CVE-2016-7934 The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
    * CVE-2016-7935 The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
    * CVE-2016-7936 The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
    * CVE-2016-7937 The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
    * CVE-2016-7938 The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().
    * CVE-2016-7939 The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
    * CVE-2016-7940 The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
    * CVE-2016-7973 The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
    * CVE-2016-7974 The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
    * CVE-2016-7975 The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
    * CVE-2016-7983 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    * CVE-2016-7984 The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
    * CVE-2016-7985 The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().
    * CVE-2016-7986 The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.
    * CVE-2016-7992 The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
    * CVE-2016-7993 A bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
    * CVE-2016-8574 The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
    * CVE-2016-8575 The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print().
    * CVE-2017-5202 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    * CVE-2017-5203 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    * CVE-2017-5204 The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
    * CVE-2017-5205 The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
    * CVE-2017-5341 The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().
    * CVE-2017-5342 In tcpdump before 4.9.0 a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
    * CVE-2017-5482 The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print().
    * CVE-2017-5483 The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().
    * CVE-2017-5484 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().
    * CVE-2017-5485 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().
    * CVE-2017-5486 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
* Thu Apr 14 2016 ro@suse.de
  - fix filelist to fix build on s390/s390x
* Wed Mar 30 2016 bg@suse.com
  - correctly reference SOURCE1 during installation for s390x
* Sun Apr 26 2015 astieger@suse.com
  - tcpdump 4.7.4:
    * PPKI to Router Protocol: Fix Segmentation Faults and other problems
    * RPKI to Router Protocol: print strings with fn_printn()
    * wb: fix some bounds checks
      (previously patched in, removed CVE-2015-3138.patch)
* Fri Apr 17 2015 astieger@suse.com
  - fix a DoS vulnerability in print-wb.c
    CVE-2015-3138 [boo#927637] adding CVE-2015-3138.patch
* Fri Mar 13 2015 vcizek@suse.com
  - update to 4.7.3
  - fixes four security bugs:
    * CVE-2015-0261 - IPv6 mobility printer (bnc#922220)
    * CVE-2015-2153 - tcp printer           (bnc#922221)
    * CVE-2015-2154 - ethernet printer      (bnc#922222)
    * CVE-2015-2155 - force printer         (bnc#922223)
  - drop patches with security fixes (upstream):
    * tcpdump-CVE-2014-8767.patch
    * tcpdump-CVE-2014-8768.patch
    * tcpdump-CVE-2014-8769.patch
    * 0001-Clean-up-error-message-printing.patch
* Fri Feb 06 2015 vcizek@suse.com
  - fix CVE-2014-8767 (bnc#905870)
    * denial of service in verbose mode using malformed OLSR payload
    * added tcpdump-CVE-2014-8767.patch
  - fix CVE-2014-8768 (bnc#905871)
    * denial of service in verbose mode using malformed Geonet payload
    * added tcpdump-CVE-2014-8768.patch
  - fix CVE-2014-8769 (bnc#905872)
    * unreliable output using malformed AOVD payload
    * added tcpdump-CVE-2014-8769.patch
    * added 0001-Clean-up-error-message-printing.patch
* Wed Sep 03 2014 andreas.stieger@gmx.de
  - tcpdump 4.6.2:
    * fix out-of-source-tree builds: find libpcap that is out of source
    * better configure check for libsmi
* Fri Aug 15 2014 andreas.stieger@gmx.de
  - tcpdump 4.6.1:
    * add a short option '#', same as long option '--number'
  - includes changes from 4.6.0:
    * all of tcpdump is now using the new "NDO" code base
    * nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL,
      DHCPv6 enhancements/fixes
    * M3UA decode added.
    * many new test cases: 82 in 4.5.1 to 133 in 4.6.0
    * cleaned up some unnecessary header files
    * Added bittok2str().
    * a number of unaligned access faults fixed
    * -A flag does not consider CR to be printable anymore
    * fx.lebail took over coverity baby sitting
    * default snapshot size increased to 256K for accomodate USB
      captures
  - includes changes from 4.5.2:
    * man page fix
  - add build and runtime libpcap minimum version
  - remove old patches, thus making package patchless:
      tcpdump-4.0.0-prototypes.patch
      tcpdump-4.0.0-aliasing.patch
  - run spec cleaner on spec file
  - remove gpg-offline, now part of source validator
  - remove versioned binary
  - run regression tests
* Sat Dec 14 2013 andreas.stieger@gmx.de
  - update to 4.5.1
    Version 4.5.0 revised for non-code related edits
    - some NFSv4 fixes for printing
    - fix printing of unknown TCP options, and tcp fast-open
    - fixes for syslog parser
    - some gcc-version-specific flag tuning
    - improvements to babel printing
    - add OpenFlow 1.0 (no SSL) and test cases
    - GeoNet printer.
    - added STBC Rx support
    - improvements to DHCPv6 decoder
    - clarify which autoconf is needed
    - Point users to the the-tcpdump-group repository on GitHub rather
      than the mcr repository
    - Add MSDP printer.
    - Fixed IPv6 check on Solaris and other OSes requiring extra
      networking libraries.
    - Add support for VXLAN (draft-mahalingam-dutt-dcops-vxlan-03),
      and add "vxlan" as an option for -T.
    - Add support for OTV (draft-hasmit-otv-04).
      fixes for DLT_IEEE802_11_RADIO datalink types
    - added MPTCP decoder
* Fri Sep 13 2013 andreas.stieger@gmx.de
  - verify source signature
* Wed Sep 11 2013 reddwarf@opensuse.org
  - update to 4.4.0
    - RPKI-RTR (RFC6810) is now official (TCP Port 323)
    - Fix detection of OpenSSL libcrypto.
    - Add DNSSL (RFC6106) support.
    - Add "radius" as an option for -T.
    - Update Action codes for handle_action function according to
      802.11s amendment.
    - Decode DHCPv6 AFTR-Name option (RFC6334).
    - Updates for Babel.
    - Fix printing of infinite lifetime in ICMPv6.
    - Added support for SPB, SPBM Service Identifier, and Unicast
      Address sub-TLV in ISIS.
    - Decode RIPv2 authentication up to RFC4822.
    - Fix RIP Request/full table decoding issues.
    - On Linux systems with cap-ng.h, drop root privileges
      using Linux Capabilities.
    - Add support for reading multiple files.
* Fri Jun 15 2012 jslaby@suse.de
  - remove tcpdump-4.0.0-uninitialized.patch, it's solved differently
* Thu Jun 14 2012 jslaby@suse.de
  - update to 4.3.0
    - fixes for forces: SPARSE data (per RFC 5810)
    - some more test cases added
    - updates to documentation on -l, -U and -w flags.
    - Fix printing of BGP optional headers.
    - Tried to include DLT_PFSYNC support, failed due to headers required.
    - added TIPC support.
    - Fix LLDP Network Policy bit definitions.
    - fixes for IGMPv3's Max Response Time: it is in units of 0.1 second.
    - SIGUSR1 can be used rather than SIGINFO for stats
    - permit -n flag to affect print-ip for protocol numbers
    - ND_OPT_ADVINTERVAL is in milliseconds, not seconds
    - Teach PPPoE parser about RFC 4638
* Tue Jan 03 2012 puzel@suse.com
  - update to 4.2.1
    - Only build the Babel printer if IPv6 is enabled.
    - Support Babel on port 6696 as well as 6697.
    - Include ppi.h in release tarball.
    - Include all the test files in the release tarball, and don't
      "include" test files that no longer exist.
    - Don't assume we have <rpc/rpc.h> - check for it.
    - Support "-T carp" as a way of dissecting IP protocol 112 as CARP
      rather than VRRP.
    - Support Hilscher NetAnalyzer link-layer header format.
    - Constify some pointers and fix compiler warnings.
    - Get rid of never-true test.
    - Fix an unintended fall-through in a case statement in the ARP
      printer.
    - Fix several cases where sizeof(sizeof(XXX)) was used when just
      sizeof(XXX) was intended.
    - Make stricter sanity checks in the ES-IS printer.
    - Get rid of some GCCisms that caused builds to fail with compilers
      that don't support them.
    - Fix typo in man page.
    - Added length checks to Babel printer.
  - drop tcpdump-4.2.0-ppi.patch (upstream)
* Mon Nov 28 2011 vcizek@suse.com
  - update to 4.2.0
    * patch that adds missing ppi.h
    * Summary for 4.2.0
    - merged 802.15.4 decoder from Dmitry Eremin-Solenikov <dbaryshkov
      at gmail dot com>
    - updates to forces for new port numbers
    - Use "-H", not "-h", for the 802.11s option. (-h always help)
    - Better ICMPv6 checksum handling.
    - add support for the RPKI/Router Protocol, per -ietf-sidr-rpki-rtr-12
    - get rid of uuencoded pcap test files, git can do binary.
    - sFlow changes for 64-bit counters.
    - fixes for PPI packet header handling and printing.
    - Add DCB Exchange protocol (DCBX) version 1.01.
    - Babel dissector, from Juliusz Chroboczek and Grégoire Henry.
    - improvements to radiotap for rate values > 127.
    - Many improvements to ForCES decode, including fix SCTP TML port
    - updated RPL type code to RPL-17 draft
    - Improve printout of DHCPv6 options.
    - added support and test case for QinQ (802.1q VLAN) packets
    - Handle DLT_IEEE802_15_4_NOFCS like DLT_IEEE802_15_4.
    - Build fixes for Sparc and other machines with alignment restrictions.
    - Merged changes from Debian package.
    - PGM: Add ACK decoding and add PGMCC DATA and FEEDBACK options.
    - Build fixes for OSX (Snow Leopard and others)
    - Add support for IEEE 802.15.4 packets
    * Summary for 4.1.2 tcpdump release
    - If -U is specified, flush the file after creating it, so it's
      not zero-length
    - Fix TCP flags output description, and some typoes, in the man
      page
    - Add a -h flag, and only attempt to recognize 802.11s mesh
      headers if it's set
    - When printing the link-layer type list, send *all* output to
      stderr
    - Include the CFLAGS setting when configure was run in the
      compiler flags
* Tue Apr 06 2010 puzel@novell.com
  - update to tcpdump-4.1.1
    * Don't blow up if a zero-length link-layer address is passed to
      linkaddr_string()
    * Fix printing of MAC addresses for VLAN frames with a length
      field
    * Add some additional bounds checks and use the EXTRACT_ macros
      more
    * Add a -b flag to print the AS number in BGP packets in ASDOT
      notation rather than ASPLAIN notation
    * Add ICMPv6 RFC 5006 support
    * Decode the access flags in NFS access requests
    * Handle the new DLT_ for memory-mapped USB captures on Linux
    * Make the default snapshot (-s) the maximum
    * Print name of device (when -L is used)
    * Print new TCP flags
    * Add support for RPL DIO
    * Add support for TCP User Timeout (UTO)
    * Add support for non-standard Ethertypes used by 3com PPPoE gear
    * Add support for 802.11n and 802.11s
    * Add support for Transparent Ethernet Bridge ethertype in GRE
    * Add 4 byte AS support for BGP printer
    * Add support for the MDT SAFI 66 BG printer
    * Add basic IPv6 support to print-olsr
    * Add USB printer
    * Add printer for ForCES
    * Handle frames with an FCS
    * Handle 802.11n Control Wrapper, Block Acq Req and Block Ack frames
    * Fix TCP sequence number printing
    * Report 802.2 packets as 802.2 instead of 802.3
  - drop tcpdump-4.0.0-autoconf.patch (not needed with new autoconf)
  - compile with -fno-strict-aliasing

Files

/usr/sbin/tcpdump
/usr/share/doc/packages/tcpdump
/usr/share/doc/packages/tcpdump/CHANGES
/usr/share/doc/packages/tcpdump/CREDITS
/usr/share/doc/packages/tcpdump/LICENSE
/usr/share/doc/packages/tcpdump/README
/usr/share/doc/packages/tcpdump/README.md
/usr/share/doc/packages/tcpdump/atime.awk
/usr/share/doc/packages/tcpdump/packetdat.awk
/usr/share/doc/packages/tcpdump/send-ack.awk
/usr/share/doc/packages/tcpdump/stime.awk
/usr/share/man/man1/tcpdump.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 9 10:26:55 2021