diff options
author | Gerald Combs <gerald@wireshark.org> | 2015-12-29 10:11:45 -0800 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2015-12-29 18:31:46 +0000 |
commit | fadb421970e5e2103ebd15ca1e5d19b89d20efa0 (patch) | |
tree | b048f1d02487e3cccf1e7d4feb74f3ba6e1662d5 | |
parent | 7da618a5ef92c33217a497c76ba80700ba3597e0 (diff) | |
download | wireshark-fadb421970e5e2103ebd15ca1e5d19b89d20efa0.tar.gz wireshark-fadb421970e5e2103ebd15ca1e5d19b89d20efa0.tar.bz2 wireshark-fadb421970e5e2103ebd15ca1e5d19b89d20efa0.zip |
Build 1.12.9.wireshark-1.12.9v1.12.9
Change-Id: I67fba5f18ef5fd5a6c4024fa01a4faf64ec159f6
Reviewed-on: https://code.wireshark.org/review/12921
Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r-- | ChangeLog | 1571 | ||||
-rw-r--r-- | NEWS | 245 | ||||
-rw-r--r-- | docbook/release-notes.asciidoc | 79 | ||||
-rw-r--r-- | epan/CMakeLists.txt | 2 | ||||
-rw-r--r-- | version.conf | 12 | ||||
-rw-r--r-- | wiretap/CMakeLists.txt | 2 |
6 files changed, 1829 insertions, 82 deletions
@@ -0,0 +1,1571 @@ +commit 7da618a +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Dec 13 15:10:21 2015 -0800 + + Prep for 1.12.9. + + Change-Id: I152fc288a3bf4861b2cdf9ceca59e3ba10d2bfaf + Reviewed-on: https://code.wireshark.org/review/12889 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit d8ed2a8 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Dec 27 08:24:31 2015 -0800 + + [Automatic update for 2015-12-27] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I222bc2b24324e40a48a60d8d2fa56b47ae39ec54 + Reviewed-on: https://code.wireshark.org/review/12878 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 67109b1 +Author: Martin Kaiser <wireshark@kaiser.cx> +Date: Wed Dec 23 18:09:10 2015 +0100 + + [mp2t] adaptation_field_control for NULL packets should not be 0 + + just remove the wrong statement, I'll add some expert info later... + + Bug: 11921 + Change-Id: I1a4f2e32e9c7c32c54b251445f8750d7c3f5ab6f + Reviewed-on: https://code.wireshark.org/review/12850 + Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> + (cherry picked from commit 1308189348b43e3ec1cfea13bc66060a844edd3d) + Reviewed-on: https://code.wireshark.org/review/12852 + +commit 35ae177 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Dec 21 17:50:56 2015 -0800 + + Don't use run_and_catch_crashes. + + The 1.12 tree doesn't have it. + + Change-Id: Idb63bcf061e3e4ced6645f54254b18f350cdf8fb + Reviewed-on: https://code.wireshark.org/review/12817 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit cc0377b +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Dec 21 14:01:22 2015 -0800 + + Don't write out statistics if we don't have any. + + We don't know when the capture started or ended (the time stamps of the + first and last packets aren't necessarily the time when the capture + started or ended), we don't know how many packets were dropped in the + capture process, and we don't know how many packets were seen in various + stages before they were received by whatever software dumped them out as + text, so we have no statistics to report. + + Change-Id: Ic6de25242d2ea536f0f17a1a20a4e05cf03d8416 + Reviewed-on: https://code.wireshark.org/review/12813 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 2052db228c7fa76146517b6c3822ea47f7b3f3de) + Reviewed-on: https://code.wireshark.org/review/12814 + +commit 655307e +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Dec 21 13:38:06 2015 -0800 + + This now needs the new <wsutil/sha1.h>. + + Change-Id: I41d30ecbffae4e83933e02616daf0d09bce9eabe + Reviewed-on: https://code.wireshark.org/review/12811 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 0a84d89 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Dec 21 12:55:37 2015 -0800 + + Always free the decrypted key in AirPDcapDecryptWPABroadcastKey(). + + If we've allocated it, free it before we return, even if we return an + error. + + Also, zero it out when we allocate it. + + Change-Id: I105671074ea007720c0038ec897be7702f486783 + Reviewed-on: https://code.wireshark.org/review/12810 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 0dcd9b1 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Dec 21 12:44:38 2015 -0800 + + g_mallocate the encrypted key, but free it in all paths out of the function. + + It doesn't need to persist after the function returns. + + Change-Id: Ic601a6ef6a0aa0f22f9c8b9a1c586cec95093f27 + Reviewed-on: https://code.wireshark.org/review/12805 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 6ede7d4ba3d7acaf90846618afd0830a57511b64) + Reviewed-on: https://code.wireshark.org/review/12807 + +commit 690688d +Author: Alexander Wetzel <alexander.wetzel@web.de> +Date: Sun Nov 22 14:01:23 2015 +0100 + + WPA (IEEE802.11) decryption function cleanups + + - Updated AirPDcapPacketProcess function description + - Try to return better error codes + - Remove broken/useless return of keys from AirPDcapRsna4WHandshake + + Change-Id: I706c129a29016ab1499f1b2fa243da8b70ba6bfb + Reviewed-on: https://code.wireshark.org/review/12804 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit f42616a +Author: Alexander Wetzel <alexander.wetzel@web.de> +Date: Sun Nov 1 18:49:42 2015 +0100 + + WPA/WPA2 decoding fixes and improvements + + - start decoding when we have eapol1+2 packets + Do not insist on a complete captured handshake, decode what we can. + + - more robust way to detect eapol #2 packets + At least Win 10 is violating the spec on rekey by setting the secure + bit in #2. Unpatched version shows and handles #2 as #4, breaking + decoding after rekey. + + - fixed eapol rekey key handling + Inital patch (see https://code.wireshark.org/review/8268) + is adding redundant keys, since it scans all the time + and not only once. + + - ignore tailing garbage after eapol sections in frame + See https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9065#c8 + + Included testcase to test decode for incomplete handshakes and eapol2 + packets with secure bit set on rekey. + + Change-Id: I5bf8ec442c262e92f2d09b706ec83bc78fec8fec + Ping-Bug: 9065 + Reviewed-on: https://code.wireshark.org/review/12802 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 3065829 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Wed Oct 7 14:24:56 2015 +0200 + + airpdcap: add free_key_string function, fix memleaks + + Do not leak the key and SSID. Note that there are still some leaks in + the GTK UI related to get_wireshark_keys(), but I did not track them + down. + + Caught by LeakSanitizer. + + Change-Id: I91308a9cd5d91d601bc778bdf10bfae8254ad2af + Reviewed-on: https://code.wireshark.org/review/12792 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit bb3c2e5 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Sep 7 22:03:22 2015 -0700 + + Move some stuff into the only code path where it's used. + + AirPDCapPacketProcess() really does two different things; some of the + stuff it does in both code paths only needs to be done in one code path. + Make it so. + + Change-Id: Idb231d729150781f323e88ed375c983a3afd2577 + Reviewed-on: https://code.wireshark.org/review/10439 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit f25b8c6784e7dab61e0754159dd3202bda584da9) + Reviewed-on: https://code.wireshark.org/review/12791 + +commit 6730ced +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Jun 6 19:29:21 2015 +0200 + + airpdcap: fix V512 warning reported by PVS-Studio + + A call of the 'memcpy' function will lead to the '& tmp_key' buffer becoming out of range. + + Change-Id: I615a6c3e0dab8cfc2d240b6b39cff387e0689f35 + Reviewed-on: https://code.wireshark.org/review/8796 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 99d56fb0f883b07662490644a9459d4ab75baf31) + Reviewed-on: https://code.wireshark.org/review/12790 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit f96b215 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Jun 5 15:43:10 2015 +0200 + + Fix a few issues reported by PVS-Studio + + See http://www.viva64.com/en/b/0328/ for details + + Change-Id: I40371db5972ba6ae707116052462f8d1de98c5c4 + Reviewed-on: https://code.wireshark.org/review/12789 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 55a02a0 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sun May 10 21:16:47 2015 +0200 + + Copy PTK key in its dedicated array, and not at the address of the array + + While we are at it, put back some debug logs that were removed in g1439eb6 (otherwise msgbuf is no more initialized) + + Change-Id: Ie34c4f2e638bc3ee77a0565446de37a15385dc0d + Reviewed-on: https://code.wireshark.org/review/8389 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 040641dc598b4d4873171a6700e202f5e8b8c318) + Reviewed-on: https://code.wireshark.org/review/12788 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit eba5410 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun May 10 11:03:35 2015 -0700 + + Don't initialize a variable that's unused before we later set it. + + Change-Id: I944cac044a8b091cbe5d85cd63a8c698a82b8559 + Reviewed-on: https://code.wireshark.org/review/8388 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 19aaa18b2cf569523a1e29bfc72e0cbc3f9a9d9d) + Reviewed-on: https://code.wireshark.org/review/12787 + +commit 270cb60 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun May 10 11:00:25 2015 -0700 + + Pick array sizes based on what they're supposed to hold. + + In AirPDcapRsnaPwd2PskStep(), digest[] holds an SSID plus 4 bytes of + count, so the size is MAX_SSID_LENGTH plus 4, and digest1[] holds an + SHA-1 digest, so the size is SHA1_DIGEST_LEN. + + That makes it a bit clearer why those are the sizes. + + Change-Id: I58ed6643f57675375f7f369470d600382323315f + Reviewed-on: https://code.wireshark.org/review/8387 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 7d4e0c73a3479560b6870f6d3cc7c2bdaab810b3) + Reviewed-on: https://code.wireshark.org/review/12786 + +commit 16595d4 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 9 23:53:20 2015 -0700 + + Add some bounds checks. + + Change-Id: I5b0405f814d439c1d5ce329a817475102be483af + Reviewed-on: https://code.wireshark.org/review/8373 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit be8f9c4cf38594368702eeb0c70e920461a10e6e) + Reviewed-on: https://code.wireshark.org/review/12785 + +commit 3ad49f7 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 9 19:30:15 2015 -0700 + + new_key is used only for TKIP keys; set it only in that part of the code. + + Change-Id: I64424731e4d5f94c7b69436b5318b67a14471171 + Reviewed-on: https://code.wireshark.org/review/8372 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit dac801545446180cc593bdd4f13a65488defb6e4) + Reviewed-on: https://code.wireshark.org/review/12784 + +commit 239c02b +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 9 19:17:57 2015 -0700 + + Allocate the unwrapped key in AES_unwrap(). + + Have it allocate the buffer for the unwrapped key and return a pointer + to it, rather than having it be handed a buffer for that key. + + That makes it a bit easier to validate, in AES_unwrap, that we don't + write past the end of the buffer. + + Change-Id: Id02852c23054b3ed33eeeb383e7aa6cf12d02ed9 + Reviewed-on: https://code.wireshark.org/review/8371 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 1507b4a4170f758d9c1fcd5f9ae9e39c8a801c0b) + Reviewed-on: https://code.wireshark.org/review/12783 + +commit b2c9e5a +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 9 16:35:45 2015 -0700 + + Define the SHA-1 digest length in wsutil/sha1.h and use it. + + Hopefully that'll make it a little easier to make sure that we're not + overflowing arrays. + + Change-Id: Id68d304cbae47bce3cd96b87cda4ba7dd6efc7af + Reviewed-on: https://code.wireshark.org/review/12779 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 854e49e +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri May 8 21:14:10 2015 +0200 + + airpdcap: ensure that buffer put on stack is big enough to hold the result of AirPDcapRsnaPwd2PskStep() + + g1439eb6 changed AIRPDCAP_WPA_PSK_LEN from 64 bytes to 32 bytes, leading to a stack corruption in AirPDcapRsnaPwd2Psk() function + + Change-Id: Ibf51f6749715055cd84906a144214ed44c85256b + Reviewed-on: https://code.wireshark.org/review/8358 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit db3412051ff3e20526f2f4bbf11271da4d70ef56) + Reviewed-on: https://code.wireshark.org/review/12778 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit bac021c +Author: deagol <alexander.wetzel@web.de> +Date: Fri May 1 22:56:50 2015 +0200 + + IEEE 802.11: 802.1X (WPA-EAP) rekeying support + + This patch extends the existing decryption support for WPA to also + handle rekeys by checking each decrypted packet for a 4-way-handshake. + + Rekeys can be used for WPA-PSK, but are more common with WPA-Enterprise + (WPA-EAP). + + For decrypting WPA-EAP secured packets the user must provide all used PMK's + of the connection (aka PSK's) as WPA-PSK 32 byte hex values to wireshark + via the existing interface. + (The capture must have all 4-way-handshakes included also, starting with + the first unencrypted one.) + + Every decrypted unicast packet will habe the used PMK and TK shown in the + CCMP/TKIP section below the key index in the GUI. Group packets will display the + GTK instead. + + Additionally this fixes a small issue with group rekey handling, so every packet + can be selected in the GUI in random order, removing the need to manually find + the correct group keying packets prior to that. + + It was tested primary with WPA-CCMP, but TKIP is also working. + + One section in the code touch bluetooth 802.1X support. It should do + exactly the same, but will now also examine all decypted packets for rekeys. + + Ping-Bug: 11172 + Change-Id: I19d055581fce6268df888da63485a48326046748 + Reviewed-on: https://code.wireshark.org/review/8268 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + Reviewed-on: https://code.wireshark.org/review/12777 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 8110a70 +Author: Martin Kaiser <wireshark@kaiser.cx> +Date: Sun Dec 20 15:47:28 2015 +0100 + + [airpdcap] check the length of the WPA broadcast key we calculated + + return an error if our key is shorter than the key type required for the + encryption method we detected + + this check prevents an out-of-bounds memory access when the key is copied + + Bug: 11826 + Change-Id: Ic779b5d87aa97a3b2d2b2c92ce12d0fff4a85adc + Reviewed-on: https://code.wireshark.org/review/12743 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + Reviewed-on: https://code.wireshark.org/review/12771 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + +commit 8d9e4aa +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Dec 20 18:21:35 2015 -0800 + + Squelch another warning. + + Change-Id: I7340954d9ca2fd11a6db2aa7cd5493d870181e23 + Reviewed-on: https://code.wireshark.org/review/12765 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit c9670e334c38f98da485b53bbd09571047836064) + Reviewed-on: https://code.wireshark.org/review/12767 + +commit b5ffe6f +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Dec 20 16:41:24 2015 -0800 + + Squelch some compiler warnings. + + Change-Id: Iee46c43498f42e19dfab0178e80743d35d843d2d + Reviewed-on: https://code.wireshark.org/review/12762 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit f553431ad0340355885fc9820f5727205c44e7c4) + Reviewed-on: https://code.wireshark.org/review/12764 + +commit 71c2d1c +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Dec 20 16:30:39 2015 -0800 + + Rename some variables to make it a bit clearer what they are. + + rec_length_remaining is the amount of data we haven't already read from + the record; it starts out as the record length and gets decreased. It + is not the length of data in the packet. + + Change-Id: I767c3afc4cd78efbe3fe59275001f869454f0263 + Reviewed-on: https://code.wireshark.org/review/12761 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 3a3ddbd +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Dec 20 15:18:37 2015 -0800 + + Add bounds checks and fix a length argument. + + Before reading the record header of a REC_FRAME{2,4,6} record, make sure + the record length is >= the length of that header. + + Whe calling fix_pseudo_header(), pass the actual length of the packet + data, not the remaining length of the record (which may include + padding), so we don't read past the end of the packet data. + + Bug: 11827 + Change-Id: I1c63a4cb014c4616ffdd202660e68c576f266872 + Reviewed-on: https://code.wireshark.org/review/12756 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 53a3e53fce30523d11ab3df319fba7b75d63076f) + Reviewed-on: https://code.wireshark.org/review/12758 + +commit 916c88e +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Dec 20 08:24:29 2015 -0800 + + [Automatic update for 2015-12-20] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: Iddacc470de7dc427f9886ee9b526c13c0d4883f8 + Reviewed-on: https://code.wireshark.org/review/12749 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 38da859 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat Dec 19 10:24:47 2015 -0800 + + Add missing ERF types, mention another missing type, mention reserved space. + + Add the TYPE_COLOR_HASH_POS and TYPE_COLOR_HASH_ETH types, note that + type 26 has no #define, mention that types 28 through 31 are reserved + for future record types. + + Change-Id: If4280740bb3522cfc5ef79e9136a26ccadcc0bf2 + Reviewed-on: https://code.wireshark.org/review/12730 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit bf25bf9 +Author: Anthony Coddington <anthony.coddington@endace.com> +Date: Thu Nov 19 16:23:53 2015 +1300 + + ERF: Add basic no-break support for ERF_TYPE_META. + + Update erf_open heuristic to not break when ERF_TYPE_META records are present. + Remove check for maximum non-pad ERF type and add defines for reserved types. + No dissection in this commit beyond record type name, this will come later. + + Change-Id: Ib2e77edeec5b28234577dede1d8ba51e3c7ddb44 + Reviewed-on: https://code.wireshark.org/review/12727 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 640846b +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 15 17:19:37 2015 -0800 + + Report an error if the IP total length is bigger than the containing length. + + Change-Id: Ib5990fce89304808a585a99164c0176899acbbb7 + Reviewed-on: https://code.wireshark.org/review/12667 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit a257ede0fa46e5cd9e81313d7a9c9c48294edb9b) + Reviewed-on: https://code.wireshark.org/review/12669 + +commit 0880b43 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 15 16:39:27 2015 -0800 + + Don't report an error for a non-multiple-of-4 chunk length. + + To quote RFC 4960: + + Chunk Length: 16 bits (unsigned integer) + + This value represents the size of the chunk in bytes, including + the Chunk Type, Chunk Flags, Chunk Length, and Chunk Value fields. + Therefore, if the Chunk Value field is zero-length, the Length + field will be set to 4. *The Chunk Length field does not count any + chunk padding.* + + Chunks (including Type, Length, and Value fields) are padded out + by the sender with all zero bytes to be a multiple of 4 bytes + long. This padding MUST NOT be more than 3 bytes in total. The + Chunk Length value does not include terminating padding of the + chunk. However, it does include padding of any variable-length + parameter except the last parameter in the chunk. The receiver + MUST ignore the padding. + + Note: A robust implementation should accept the chunk whether or + not the final padding has been included in the Chunk Length. + + so the the chunk is *not* required to include the length of the final + padding in the chunk, although any padding *between* variable-length + parameters in the chunk must be included in the length (obviously, as + it's part of the chunk data). + + Change-Id: I691de489ffc800813dc9a6ab59ecc108540512d1 + Reviewed-on: https://code.wireshark.org/review/12666 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit a6c381e +Author: Gerald Combs <gerald@wireshark.org> +Date: Mon Dec 14 10:45:50 2015 -0800 + + Perl: Using "defined(@array)" is deprecated. + + Perl deprecated "defined(@array)" long ago and versions >= 5.16.0 + trigger a warning when it's used. + + Change-Id: I27195e1afa027449acde3783b07cea52b9ee74e2 + Reviewed-on: https://code.wireshark.org/review/12627 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit ddecc1a +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 31 13:08:11 2014 -0700 + + Don't force a verbose build. + + That was probably something I put in while debugging. It can be put + back - or added to some other make command - as necessary. + + Change-Id: I184a5b8537c43c87844e6e75f65dd3c0accde9ac + Reviewed-on: https://code.wireshark.org/review/5033 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + Reviewed-on: https://code.wireshark.org/review/12601 + +commit 7f9c86b +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 31 12:27:30 2014 -0700 + + Undo my personal disabling of the Qt download/build/install. + + I did that because I didn't want to wait a day for Qt to build, but + didn't intend to make that change in the official source. + + In the longer term, we should perhaps change the script to download and + install a binary package; sadly, their installers can't be made 100% + command-line and automated, but, well, the CMake installer pops up a + dialog, too, and if you don't have Java installed, some of the configure + scripts that check for Java pop up non-blocking "do you want to install + Java?" dialogs from OS X. + + Change-Id: I99781d5e54529955bf9363a7ee9d4122403fa955 + Reviewed-on: https://code.wireshark.org/review/5032 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + Reviewed-on: https://code.wireshark.org/review/12600 + +commit 1caf362 +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 31 12:11:22 2014 -0700 + + For OS X, don't rigidly tie the SDK version to the minimum target version. + + According to + + https://developer.apple.com/library/mac/documentation/DeveloperTools/Conceptual/cross_development/Configuring/configuring.html#//apple_ref/doc/uid/10000163i-CH1-SW1 + + the deployment target (minimum target OS version) and SDK version aren't + necessarily the same and, in fact, Apple typically only ship two SDKs + with each Xcode release, so if you want to build for 10.6 with the 10.6 + SDK, you have to use a version of Xcode sufficiently old to have the + 10.6 SDK. + + Here, we instead search for the oldest SDK for an OS whose version is + greater than or equal to the deployment target. Note that this may not + work for X11-based Wireshark, as the X11 libraries can change + incompatibly between releases. (Fortunately, our plan is to kick + X11-based Wireshark to the curb for OS X, removing a large pile of + aggravation for users.) + + This also requires some fixes when building Qt and gdk-pixbuf, as some + cases where we were using the minimum OS target version we needed to be + using the SDK version. + + For CMake, we're using its native "deployment target" support for OS X, + and hope that it will somehow do the right thing. + + Change-Id: I801c404311062fd3685014df7fa0b766093fd44d + Reviewed-on: https://code.wireshark.org/review/12599 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit a07e1df +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Sun Dec 13 13:32:34 2015 +0100 + + ui: Read and write correct recent timestamp format + + Rewrite to use value_string to ensure correct value strings used, + to add backward compatibility and to avoid global-buffer-overflow + in possible future inconsistencies. + + This bug was introduced in 2a088c1d when adding new timestamp formats. + + Change-Id: Idbf0d176250a7468b4631a106683eba091013f94 + Reviewed-on: https://code.wireshark.org/review/12598 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 37d5b92 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Dec 13 10:05:06 2015 -0800 + + Explicitly specify the template for the mktemp command. + + Not all versions of mktemp support omitting the template; in particular, + the one provided by some BSD-flavored OSes don't. + + Change-Id: I657e002559dce165c677a473aa10bb17cc506037 + Reviewed-on: https://code.wireshark.org/review/12592 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e01f8fb3ad4e635a09f8beb88cb1fcc0baeb0232) + Reviewed-on: https://code.wireshark.org/review/12594 + +commit ca0e3bf +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Dec 13 08:25:45 2015 -0800 + + [Automatic update for 2015-12-13] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I4039d9d8882c5081adc74680b43b70707ae75817 + Reviewed-on: https://code.wireshark.org/review/12590 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 884d49c +Author: Anish Bhatt <anish@chelsio.com> +Date: Sat Dec 12 13:54:29 2015 -0800 + + NBAP : Verify conversation proto data exists before trying to access it + + + Bug 11841 + Change-Id: Ic0dea6491a68a042ddc0f2dbee19739e4568b18c + Reviewed-on: https://code.wireshark.org/review/12576 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 23379ae3624df82c170f48e5bb3250a97ec61c13) + Reviewed-on: https://code.wireshark.org/review/12585 + (cherry picked from commit 254731ee05ab663fb79f3431ac0aa141b7065de0) + Reviewed-on: https://code.wireshark.org/review/12586 + +commit 6b3755c +Author: Michael Mann <mmann78@netscape.net> +Date: Fri Dec 11 21:48:58 2015 -0500 + + Increase ZBEE_ZCL_APPL_EVTALT_NUM_STRUCT_ETT to match ZBEE_ZCL_APPL_EVTALT_COUNT_NUM_MASK, to prevent invalid ett_ array access. + + Change-Id: I67e79e97e13081a77bb5202cbbc1e4f1ee872c95 + Reviewed-on: https://code.wireshark.org/review/12556 + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit eb0c034f6e4cdbf5ae36dd9ba8e2743630b7bd38) + Reviewed-on: https://code.wireshark.org/review/12570 + (cherry picked from commit 07dbf78872b7436a05c4cfe412f48dbde24c4eda) + Reviewed-on: https://code.wireshark.org/review/12571 + +commit 49e7e7f +Author: Michael Mann <mmann78@netscape.net> +Date: Fri Dec 11 21:43:53 2015 -0500 + + Range check ett_ array access. + + Bug: 11830 + Change-Id: I010093f0ee6f876161de0aca24ea5037616d0039 + Reviewed-on: https://code.wireshark.org/review/12555 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 9352616ec9742f2ed3d2802d0c8c100d51ca410b) + Reviewed-on: https://code.wireshark.org/review/12568 + (cherry picked from commit b11c868857f98ffdf4b2d3dc8ae30d0219278709) + Reviewed-on: https://code.wireshark.org/review/12569 + +commit f899e8a +Author: Michael Mann <mmann78@netscape.net> +Date: Fri Dec 11 22:23:59 2015 -0500 + + [RSL] Just return rest of packet if TLV type is unknown + + Bug: 11829 + Change-Id: Id31ec9ee970c3a1e1fe64e3bf823f9ab78f7cd9e + Reviewed-on: https://code.wireshark.org/review/12558 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0) + Reviewed-on: https://code.wireshark.org/review/12564 + +commit 1a44ff1 +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Dec 11 17:00:05 2015 -0800 + + Clamp zooming so that we don't get zero or negative font sizes. + + Those are obviously wrong. + + Also, clean up some stuff left over from the GTK+ 1.x days; GTK+ 2.x + doesn't expose raw XLFD font names, it lets you specify a font by name + and size, and font_zoom() doesn't determine whether the font is + resizeable - it just constructs a new font name/size pair and leaves it + up to its callers to try to load the font, so "there's no such font as + Wingdings Gothic" and "you can't blow up Fraktur to 10 million points" + both show up as errors loading the font by name. + + Bug: 8854 + Change-Id: I6af142c75c9ebabd1a95308c203f8cb1f36dd82f + Reviewed-on: https://code.wireshark.org/review/12549 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit b8b77aecc38f8ada88de78939e4d35d0fa535bd4) + Reviewed-on: https://code.wireshark.org/review/12551 + +commit 9c62fc6 +Author: João Valverde <joao.valverde@tecnico.ulisboa.pt> +Date: Fri Dec 11 01:04:13 2015 +0000 + + 6LowPAN: Check for NHC IPv6 No Next Header + + Bug: 11728 + Change-Id: I7b7cc72b4200e53856283e0716383d661a16fa77 + Reviewed-on: https://code.wireshark.org/review/12512 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit e8b8568b7c5d0035a13b6f0dd93a5406ffff0b13) + Reviewed-on: https://code.wireshark.org/review/12523 + (cherry picked from commit e8ef139d9d2b40b5d076c678ab3330236a66f4dd) + Reviewed-on: https://code.wireshark.org/review/12524 + +commit 7d1f775 +Author: Alexis La Goutte <alexis.lagoutte@gmail.com> +Date: Sun Dec 6 19:57:50 2015 +0100 + + MIP6: Don't no need to have a another subtree (with wrong length for LLA) + + Conflicts: + epan/dissectors/packet-mip6.c + + Bug: 10627 + Change-Id: Ia6940ef7624a92d453cada6693bcd7f4e145a5b6 + Reviewed-on: https://code.wireshark.org/review/12453 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 0d2fce11894f9e91959341ad9ee38bf9da296547) + Reviewed-on: https://code.wireshark.org/review/12458 + (cherry picked from commit 29daa1d29496b2d92c1bb8a701e51d962c94715b) + Reviewed-on: https://code.wireshark.org/review/12465 + Tested-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + +commit 4e00398 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Dec 6 08:24:34 2015 -0800 + + [Automatic update for 2015-12-06] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I84b8de8520e9d18de71b31be7a01171fd14ee075 + Reviewed-on: https://code.wireshark.org/review/12452 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 96d8e98 +Author: Alexis La Goutte <alexis.lagoutte@gmail.com> +Date: Wed Dec 2 09:19:41 2015 +0100 + + OSTIP: fix typo found by PVS Studio (V519) + + The 'pinfo->clnp_dstref' variable is assigned values twice successively + + Change-Id: I02b8ae54728f88c2173b4522d436bd2f7b1b7bc0 + Reviewed-on: https://code.wireshark.org/review/12365 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 1f363e5c4bf493c9581d8a1bdf9fa9796856628a) + Reviewed-on: https://code.wireshark.org/review/12379 + (cherry picked from commit fd0a18e16b2507b7190fab166c9ec3312a9397f0) + Reviewed-on: https://code.wireshark.org/review/12380 + +commit 97452dd +Author: João Valverde <joao.valverde@tecnico.ulisboa.pt> +Date: Sat Aug 22 18:31:41 2015 +0100 + + Do not treat all unknown IP protocols as unknown IPv6 extension headers + + Bug: 9996 + Change-Id: I229260ce668b60a9756cd3f2e343c278ae27c211 + Reviewed-on: https://code.wireshark.org/review/12278 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit 9f2e4d7 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 1 17:31:25 2015 -0800 + + Fix field long name. + + (Copy-and-pasteo.) + + Add some comments while we're at it. + + Change-Id: If03a43203a2ee7fad54b76cbdaf9318768edc1b0 + Reviewed-on: https://code.wireshark.org/review/12354 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit dd74e49166943a8e2345ce0ce0fbcc14c1060915) + Reviewed-on: https://code.wireshark.org/review/12356 + +commit ea517f9 +Author: Michael Mann <mmann78@netscape.net> +Date: Tue Dec 1 16:53:34 2015 -0500 + + [NBAP] Fix SIGSEGV in dissect_nbap_MACdPDU_Size + + Bug: 11815 + Change-Id: I107cf90df87bdafa23bd4b81acbc25d98773b223 + Reviewed-on: https://code.wireshark.org/review/12347 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit d2644aef369af0667220b5bd69996915b29d753d) + Reviewed-on: https://code.wireshark.org/review/12350 + (cherry picked from commit 4c499f54d38b2749a3da634da297c019582ebadd) + Reviewed-on: https://code.wireshark.org/review/12351 + +commit 3e1cd49 +Author: Michael Mann <mmann78@netscape.net> +Date: Mon Nov 30 23:42:33 2015 -0500 + + [NBAP] Prevent crash. + + If no previous conversation exists, a memcpy will try to copy from NULL destination. + + Bug: 11835 + Change-Id: I445480bb425834c5a918f1ffa148cb83d6c9750c + Reviewed-on: https://code.wireshark.org/review/12326 + Reviewed-by: Michael Mann <mmann78@netscape.net> + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 5b4ada17723ed8af7e85cb48d537437ed614e417) + Reviewed-on: https://code.wireshark.org/review/12329 + +commit 9cf09cf +Author: Michael Mann <mmann78@netscape.net> +Date: Sat Nov 28 16:17:22 2015 -0500 + + Fix out-of-bounds read in ascend_seek. + + Bug: 11794 + Change-Id: I74517806b119729ae6d9780bbd4bb094701ff05e + Reviewed-on: https://code.wireshark.org/review/12266 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b) + Reviewed-on: https://code.wireshark.org/review/12296 + (cherry picked from commit 7abfa36686850a0d81ef1ef280a181d09e5e639c) + Reviewed-on: https://code.wireshark.org/review/12297 + +commit 51ccf92 +Author: Michael Mann <mmann78@netscape.net> +Date: Sat Nov 28 19:08:11 2015 -0500 + + Add bounds checking to find_signature. + + Bug: 11791 + Change-Id: Ibaa2c16229c1b78818283ba5f954b09f3894dc60 + Reviewed-on: https://code.wireshark.org/review/12270 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 185911de7d337246044c8e99da2f5b4bac74c0d5) + Reviewed-on: https://code.wireshark.org/review/12294 + (cherry picked from commit e4267dd4d03b81c74cd6bc9f574f3f10936ee354) + Reviewed-on: https://code.wireshark.org/review/12295 + +commit 01433a4 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sun Nov 29 17:57:02 2015 +0100 + + GSM SMS: fix reassembly of UCS2 encoded SMS + + Bug: 11809 + Change-Id: I5cbf43cbc9d0f33fa527aef1be4d5105f1d795a7 + Reviewed-on: https://code.wireshark.org/review/12288 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 257938f66c255e2e978d0bf697f1d0e780620d55) + Reviewed-on: https://code.wireshark.org/review/12291 + +commit 8194323 +Author: Michael Mann <mmann78@netscape.net> +Date: Sun Nov 29 08:45:28 2015 -0500 + + Replace my_dgt_tbcd_unpack with the safer tvb_bcd_dig_to_wmem_packet_str. + + Bug: 11797 + Change-Id: Iecca888d68e7710b871fa67af2a1174a294d9594 + Reviewed-on: https://code.wireshark.org/review/12273 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit 8f04763 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 29 08:29:44 2015 -0800 + + [Automatic update for 2015-11-29] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: Idea2b72312a9d3d685b426085a78bcfb06513f54 + Reviewed-on: https://code.wireshark.org/review/12286 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 7adf696 +Author: João Valverde <joao.valverde@tecnico.ulisboa.pt> +Date: Sat Nov 28 22:53:51 2015 +0000 + + IPv6: Fix RPL routing header computed address count if ip6r_len == 0 + + Bug: 11803 + Change-Id: I6de6a240dee1cfb310c41976853c0c3683b0b80a + Reviewed-on: https://code.wireshark.org/review/12277 + Reviewed-by: Michael Mann <mmann78@netscape.net> + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + +commit 5d20997 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Nov 28 14:47:28 2015 +0100 + + RSVP: copy all rsvp_request_key info in file scope + + This is needed as it is later used for comparisons in the request hash table + + Bug: 11793 + Change-Id: I2ee1c894892c6ae88c4eac23237991b547a0983b + Reviewed-on: https://code.wireshark.org/review/12258 + Reviewed-by: Michael Mann <mmann78@netscape.net> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit fef89fc +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sat Nov 28 10:54:16 2015 +0100 + + vwr: fix buffer overrun in getRate + + Bug: 11789 + Change-Id: Ieba9f32928b91be5d07b25bf54005155f7cc79f6 + Reviewed-on: https://code.wireshark.org/review/12261 + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 135c8f050f7f0145b54d952b38ca73eb0d1060cf) + Reviewed-on: https://code.wireshark.org/review/12262 + +commit 644bc78 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Nov 28 11:45:24 2015 +0100 + + Diameter: check IPv6 prefix length before copying it in e_in6_addr structure + + Bug: 11792 + Change-Id: I37a07044d40f10e9a1a90025d90753fdb3db2278 + Reviewed-on: https://code.wireshark.org/review/12248 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit aaa28a9d39158ca1033bbd3372cf423abbf4f202) + Reviewed-on: https://code.wireshark.org/review/12252 + +commit a6e8fc8 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sat Nov 28 01:24:12 2015 +0100 + + Add boundary check for 802.11 decryption + + Fixed stack-based buffer overflow when the frame length exceeds 8KB. + + Bug: 11790 + Change-Id: I20db8901765a7660e587057e955d4fb5a8645574 + Reviewed-on: https://code.wireshark.org/review/12237 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit 40b283181c63cb28bc6f58d80315eccca6650da0) + [resolved conflict by accepting comments from v2.1.0rc0-764-g9cd66b2] + Reviewed-on: https://code.wireshark.org/review/12247 + +commit 56bb0ac +Author: Michael Mann <mmann78@netscape.net> +Date: Thu Nov 26 09:09:23 2015 -0500 + + [LDAP] Bugfix counting of search results. + + Bug: 11761 + Change-Id: Icd955b848edc9f802331f25ab1b8684aa2631553 + Reviewed-on: https://code.wireshark.org/review/12184 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit c51f207308d04bda005f84828b59cec4104e4b8f) + Reviewed-on: https://code.wireshark.org/review/12221 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit d752a7b +Author: Nicolas S. Dade <nic.dade@gmail.com> +Date: Wed Nov 25 23:24:52 2015 -0800 + + L2TP: Correct L2TP over IP SHA1 message digest + + It should match the MD5 code, and skip over the 0x00000000 session id + at the start of tvb. + + Change-Id: Ia3bee2bd07015523acc49bd7cb0247c3f1ac986e + Reviewed-on: https://code.wireshark.org/review/12168 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + (cherry picked from commit 97e627e56d98bc45cd87cf629617c0dbd1798f6b) + Reviewed-on: https://code.wireshark.org/review/12177 + +commit 39a50f4 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Wed Nov 25 17:53:30 2015 +0100 + + SCTP: verify frame pointer before dereferencing it + + Bug: 11767 + Change-Id: Icd01550e0aaa4cd0cc33ae3acc0ef702c38f4db4 + Reviewed-on: https://code.wireshark.org/review/12146 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 2259bf8a827088081bef101f98e4983de8aa8099) + Conflicts: + epan/dissectors/packet-sctp.c + Reviewed-on: https://code.wireshark.org/review/12174 + +commit ff0220f +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sun Nov 22 18:16:46 2015 +0100 + + Fix buffer overrun in zlib decompression + + After updating next_in (to remove the gzip header), avail_in must also + be updated. Failing to do makes zlib read past the input buffer. In + theory this would resukt in a buffer overrun of at most double the input + length, in practice zlib returns as soon as the compression fails (after + reading a few bytes). + + Bug: 11548 + Change-Id: If71691a2846338f46d866964a77cc4e74a9b61dd + Reviewed-on: https://code.wireshark.org/review/12038 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit cec0593ae6c3bca65eff65741c2a10f3de3e0afe) + Reviewed-on: https://code.wireshark.org/review/12138 + +commit 7f90e4e +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Tue Nov 24 18:44:22 2015 +0100 + + VoIP: fix a crash when trying to retrieve the time of a T.38 tapped packet + + Rather than trying to retrieve frame_data from the packet number row (while it could be filtered) let's use pinfo + + Bug: 11596 + Change-Id: Iadbae7630da012c72b29628384a0825511672692 + Reviewed-on: https://code.wireshark.org/review/12106 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit 4245d2b +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Nov 23 21:50:08 2015 -0800 + + Fix indentation. + + Change-Id: I2a64b9919d257ee0f7a57ba40c33bea1690ae0ad + Reviewed-on: https://code.wireshark.org/review/12086 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit da8854144d17b197d367e4bb35afd47d24b50b12) + Reviewed-on: https://code.wireshark.org/review/12088 + +commit 2c59970 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Nov 23 21:48:04 2015 -0800 + + Check *how many* fields sscanf() found. + + In the code that parses a GeneralizedTime field, don't assume that all + fields were found; check the return value from sscanf(). + + This should clean up a fuzz failure on the 2.0 buildbot: + + https://buildbot.wireshark.org/wireshark-2.0/builders/Fuzz%20Test/builds/13/steps/valgrind-wireshark/logs/stdio + + Change-Id: I431d7ed69ac1697bd42c22a37ca1451cfc85c94e + Reviewed-on: https://code.wireshark.org/review/12083 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 921bb07115fbffc081ec56a5022b4a9d58db6d39) + Reviewed-on: https://code.wireshark.org/review/12085 + +commit c6efada +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Mon Nov 23 11:40:42 2015 +0100 + + HiSLIP: remove a DISSECTOR_ASSERT + + It should not be used for request/response tracking + + Change-Id: Ic93884cad5bcea40e082081097575908011871c8 + Ping-Bug: 11752 + Reviewed-on: https://code.wireshark.org/review/12063 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 8fa938d27b7388e6b5881718d45abd3315a0583c) + Conflicts: + epan/dissectors/packet-hislip.c + Reviewed-on: https://code.wireshark.org/review/12072 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit 39e8dcc +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Nov 16 14:33:32 2015 -0800 + + Create C handles for pipes before running dumpcap. + + If the C handles can't be created, there's no point in running dumpcap. + + Catch some more possible _open_osfhandle() failures while we're at it. + + Change-Id: I5b805552630034a1eaea2a6d2bfe6039cd6d7727 + Reviewed-on: https://code.wireshark.org/review/11904 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 90bc4af +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Nov 16 11:49:35 2015 -0800 + + Catch failure of _open_osfhandle(). + + This may at least prevent the crash in bug 11702, by not returning + "success" with bogus file handles of -1, if the opens fail due to + leaks chewing up all the available slots. More investigation needs to + be done to see why we're leaking. + + Change-Id: Iaa0fdac415ea1047255d64fa8597529ad31d63d1 + Reviewed-on: https://code.wireshark.org/review/11889 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 7a801e1 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 15 08:23:01 2015 -0800 + + [Automatic update for 2015-11-15] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I51ffb979cc03249d4d2bfb06e6a8699f9f0c5bbb + Reviewed-on: https://code.wireshark.org/review/11840 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 960ac0b +Author: Alexis La Goutte <alexis.lagoutte@gmail.com> +Date: Sun Feb 22 12:43:25 2015 +0100 + + DNS: Ignore Client Subnet option's data length when > 16 + + When DNS Client Subnet length is > 16, the limit coming from avoid stack smashing with tvb_memcpy + + Issue reported by Boaz + + Bug:10988 + Change-Id: I6103ba47fac9817410c7fc399c18e96c66ab8438 + Reviewed-on: https://code.wireshark.org/review/7308 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 30651ab18b42e666f57ea239e58f3ff3a5e9c4ad) + Reviewed-on: https://code.wireshark.org/review/11824 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit 146485d +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Nov 10 12:00:11 2015 -0800 + + Add CMakeLists.txt.user* to .gitignore. + + Qt Creator uses CMakeLists.txt.user to store CMake build settings. + + Change-Id: I600289183dcfbc03cd9b555c4b646e6cfb799b0e + Reviewed-on: https://code.wireshark.org/review/11700 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + (cherry picked from commit ec303c13b3f8df1feeae449830f57f20660229eb) + Reviewed-on: https://code.wireshark.org/review/11710 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + +commit 4905d2b +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 8 11:05:56 2015 -0800 + + [Automatic update for 2015-11-08] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I8cfa75911e483e0c2216f059678e116d18b0901c + Reviewed-on: https://code.wireshark.org/review/11645 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit f30de77 +Author: Gloria Pozuelo <gloria.pozuelo@bics.com> +Date: Tue Nov 3 16:49:32 2015 +0100 + + GTP sequence number fix for allowing to have sequence number equal to 0 + + Change-Id: Id8aad52198905eb33ecccf5ace01287954f31d2e + Reviewed-on: https://code.wireshark.org/review/11526 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 0b3091fa359492a0fe7af50a42a2f70d85377a35) + Reviewed-on: https://code.wireshark.org/review/11642 + +commit a91df74 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Nov 7 16:44:47 2015 +0100 + + NSIS: clear errors before checking WinPcap uninstall registry entry + + Otherwise it can lead to a false verdict in after the check for Wireshark uninstall registry entry + + Bug: 10867 + Change-Id: I213ac8ffadfb3578b05d33b996540bd4330a0ec5 + Reviewed-on: https://code.wireshark.org/review/11621 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit cdcf27255ab8907e7fe29b4518fca1c4e53202ab) + Reviewed-on: https://code.wireshark.org/review/11623 + +commit 61581bb +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 1 08:25:39 2015 -0800 + + [Automatic update for 2015-11-01] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I7e6a7d2a417805b783b974edc3e869c0fefa9c3c + Reviewed-on: https://code.wireshark.org/review/11479 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit e654611 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Oct 30 19:09:39 2015 +0100 + + RPC: fix crash when calling NLMv4 SRT statistics + + Packet scope is not valid when called from GUI. + As master-1.12 does not benefit from the code refactring done in master, we + cannot use the same solution as in g59f4c1c + Instead allow to leak a bit of memory by allocating in the epan scope. + + Bug: 11654 + Change-Id: Ia896299766f7e132b944af48a210fd44d8412282 + Reviewed-on: https://code.wireshark.org/review/11447 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit 916dfc5 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Oct 30 14:53:33 2015 +0100 + + NLM: fix double memory free when using "Match MSG/RES packets for async NLM" option + + Change-Id: I8ac8bbb7830a49c1a0973b16378515b00a1a7b65 + Reviewed-on: https://code.wireshark.org/review/11432 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit 8daac4a +Author: Peter Wu <peter@lekensteyn.nl> +Date: Mon Sep 14 00:33:27 2015 +0200 + + spdy: do not overwrite HTTPS registration + + Setting a zero port still allows it for selection in the UAT dialog + while not breaking HTTPS dissection. + + (In theory the UAT setting would work. In practice it would still call + ssl_dissector_add and take over the SSL registration for all tcp/443 + traffic. On removal with ssl_dissector_remove, the HTTPS port is not + added back again until a restart (or until the HTTPS ports list is + changed from the default) because the spdy registration overwrites the + HTTP one...) + + Also note that NPN detection for SPDY is not implemented, only ALPN + detection is supported. + + Bug: 10984 + Change-Id: I6e84aa6408abf40bb860abee4845731ce55ce254 + Reviewed-on: https://code.wireshark.org/review/10517 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + (cherry picked from commit bb7f7d32688abcbc05e954bf380d5759a0b9bf47) + Reviewed-on: https://code.wireshark.org/review/11422 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Tested-by: Peter Wu <peter@lekensteyn.nl> + +commit 3690d13 +Author: Alexis La Goutte <alexis.lagoutte@gmail.com> +Date: Thu Oct 29 13:53:26 2015 +0100 + + EtherCAT: wrong display name + + Wireshark is showing 2 consecutive bytes named "SubIdx" in a SDO info request (OpCode = 0x5) and response (OpCode = 0x6). But the second byte should be the "ValueInfo" instead in both request and response. + + Issue reported by ThoKu + + Bug:11652 + Change-Id: I7f6395208d38e714071de5dbb40e3ddb9829f210 + Reviewed-on: https://code.wireshark.org/review/11397 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 6c9ddbda65408ed15af69d74bfaa881e308f63b2) + Reviewed-on: https://code.wireshark.org/review/11401 + +commit b3f977c +Author: Ryan Doyle <ryan@doylenet.net> +Date: Thu Oct 29 21:28:46 2015 +1100 + + pcp: fix reporting of error status in info column + + Typo when the dissector was first written. It should have always been + the offset. + + Change-Id: Ica7e88571d3746811b574834cbfa0f91218d573c + Reviewed-on: https://code.wireshark.org/review/11393 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + (cherry picked from commit caeb5b0c2f461e1d51e914b0ef5e9adecc45dd76) + Reviewed-on: https://code.wireshark.org/review/11395 + +commit 78fee11 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Tue Oct 27 15:42:45 2015 +0100 + + GVCP: do not try to append register value to info column when READREG_ACK has an error status + + Bug: 11639 + Change-Id: I1389b74092138e3b28cf4f0dd2d2c8967ec8ba12 + Reviewed-on: https://code.wireshark.org/review/11310 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 4f22e9937f72a43e53262d0ca3297f686109f4c4) + Reviewed-on: https://code.wireshark.org/review/11314 + +commit 488ca33 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Oct 25 08:23:47 2015 -0700 + + [Automatic update for 2015-10-25] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: Ia161aa78733c6ec056c1281aca4612fde236650f + Reviewed-on: https://code.wireshark.org/review/11266 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit e197952 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Oct 24 11:32:16 2015 +0200 + + SDP: protect against out of bounds access + + Change-Id: I4b24441cb26757b639e8113cab18d64c7f07112f + Ping-Bug: 9887 + Reviewed-on: https://code.wireshark.org/review/11241 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 2ddd92b6f8f587325b9e14598658626f3a007c5c) + Reviewed-on: https://code.wireshark.org/review/11261 + +commit 3b42eab +Author: Jeff Morriss <jeff.morriss.ws@gmail.com> +Date: Fri Oct 23 10:58:54 2015 -0400 + + 802.1ah: call subdissectors even when we have no tree. + + Otherwise none of the subdissectors are called on the first pass which means + none of their analysis (which is generally done on the first pass) is going to + work. + + Bug: 11629 + Change-Id: I6fe8d0692e5cf6f5b5fa099d31a91d01cc5c7c68 + Reviewed-on: https://code.wireshark.org/review/11226 + Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit ae130f114cd61443c8c93e1c9280e027726a0235) + Conflicts: + epan/dissectors/packet-ieee8021ah.c + Reviewed-on: https://code.wireshark.org/review/11255 + Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> + +commit fcdb061 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Oct 24 11:35:02 2015 +0200 + + T38: fix a dereference of NULL pointer + + Change-Id: I6d0a87e301145f43af0c0ccba44c1dbb2f84adb2 + Ping-Bug: 9887 + Reviewed-on: https://code.wireshark.org/review/11243 + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e) + Reviewed-on: https://code.wireshark.org/review/11244 + +commit 41e646e +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sun Oct 18 22:44:09 2015 +0200 + + AllJoyn: prevent an infinite loop + + Display an expert error when the argument is empty + + Bug: 11607 + Change-Id: I8682eab8fe1822f784e848220ff90de4eb5e13ff + Reviewed-on: https://code.wireshark.org/review/11132 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 40caff2d1fb08262c84aaaa8ac584baa8866dd7c) + Conflicts: + epan/dissectors/packet-alljoyn.c + Reviewed-on: https://code.wireshark.org/review/11140 + +commit af920d2 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sun Oct 18 23:12:30 2015 +0200 + + DCOM: ensure to initialize IPv4 variable put on the stack + + Bug: 11610 + Change-Id: I920b88ab035ff34e7cff9eab8158aa2dabe2faac + Reviewed-on: https://code.wireshark.org/review/11134 + Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> + (cherry picked from commit d34267d0503a67235bf259fd2f2f2d2bb8b18cf5) + Reviewed-on: https://code.wireshark.org/review/11136 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit 3ee75b0 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Oct 18 08:42:11 2015 -0700 + + [Automatic update for 2015-10-18] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I8d5497b88606f492ce7062f1e741bb9e79013d29 + Reviewed-on: https://code.wireshark.org/review/11131 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 6ba5403 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sun Oct 18 10:58:37 2015 +0200 + + UMTS FP: fix another out of bounds access + + According to NBAP ASN.1, the maximum DCH ID value is 255 + + Bug: 11606 + Change-Id: Ic5c85a31eb1a84d59f25baaed4afbd040a7852c5 + Reviewed-on: https://code.wireshark.org/review/11126 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 67b6d4f7e6f2117b40957fd51518aa2a3e659002) + Reviewed-on: https://code.wireshark.org/review/11128 + +commit 66f27ab +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Oct 17 17:12:46 2015 +0200 + + UMTS FP: fix an out of bounds access + + Bug: 11602 + Change-Id: I636a5494a0eda5895e856e80424be29f01c758bf + Reviewed-on: https://code.wireshark.org/review/11117 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 2ae329a47b7f0ac94089c23e79c6b8bc18ba80ea) + Conflicts: + epan/dissectors/packet-umts_fp.c + Reviewed-on: https://code.wireshark.org/review/11123 + +commit daa562c +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sat Oct 17 13:28:19 2015 +0200 + + NBAP: avoid dereferencing a NULL pointer + + Bug: 11602 + Change-Id: I56b9db19eca416c288f36c1f3a4faa7e22b38c8f + Reviewed-on: https://code.wireshark.org/review/11109 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + (cherry picked from commit 5bf565690ad9f0771196d8fa237aa37fae3bb7cc) + Conflicts: + epan/dissectors/packet-nbap.c + Reviewed-on: https://code.wireshark.org/review/11116 + +commit 5fb38a3 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Oct 16 16:22:07 2015 +0200 + + GSM: fix dissection of additional access technology type + + Bug: 11599 + Change-Id: I80e92eefd233ad7939f8fdf684727164bd89abf4 + Reviewed-on: https://code.wireshark.org/review/11094 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit b737d7e1b888a06891f6bd78aa58e62f77fb3f94) + Reviewed-on: https://code.wireshark.org/review/11098 + +commit 8eb4b31 +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed Oct 14 13:01:55 2015 -0700 + + 1.12.8 → 1.12.9. + + Change-Id: Ida58dbef0bdca8149f9825ebf2e99e279ebd0b09 + Reviewed-on: https://code.wireshark.org/review/11045 + Reviewed-by: Gerald Combs <gerald@wireshark.org> @@ -1,4 +1,4 @@ - Wireshark 1.12.8 Release Notes + Wireshark 1.12.9 Release Notes __________________________________________________________________ What is Wireshark? @@ -11,29 +11,80 @@ What's New Bug Fixes - The following vulnerabilities have been fixed. - * [1]wnpa-sec-2015-30 - Pcapng file parser crash. Discovered by Dario Lombardo and Shannon - Sabens. ([2]Bug 11455) [3]CVE-2015-7830 + The following vulnerabilities have been fixed: + * [1]wnpa-sec-2015-31 + NBAP dissector crashes. ([2]Bug 11602, [3]Bug 11835, [4]Bug 11841) + * [5]wnpa-sec-2015-32 + UMTS FP dissector crashes. ([6]Bug 11602, [7]Bug 11606) + * [8]wnpa-sec-2015-33 + DCOM dissector crash. ([9]Bug 11610) + * [10]wnpa-sec-2015-34 + AllJoyn dissector infinite loop. ([11]Bug 11607) + * [12]wnpa-sec-2015-35 + T.38 dissector crash. ([13]Bug 9887) + * [14]wnpa-sec-2015-36 + SDP dissector crash. ([15]Bug 9887) + * [16]wnpa-sec-2015-37 + NLM dissector crash. + * [17]wnpa-sec-2015-38 + DNS dissector crash. ([18]Bug 10988) + * [19]wnpa-sec-2015-39 + BER dissector crash. + * [20]wnpa-sec-2015-40 + Zlib decompression crash. ([21]Bug 11548) + * [22]wnpa-sec-2015-41 + SCTP dissector crash. ([23]Bug 11767) + * [24]wnpa-sec-2015-42 + 802.11 decryption crash. ([25]Bug 11790, [26]Bug 11826) + * [27]wnpa-sec-2015-43 + DIAMETER dissector crash. ([28]Bug 11792) + * [29]wnpa-sec-2015-44 + VeriWave file parser crashes. ([30]Bug 11789, [31]Bug 11791) + * [32]wnpa-sec-2015-45 + RSVP dissector crash. ([33]Bug 11793) + * [34]wnpa-sec-2015-46 + ANSI A & GSM A dissector crashes. ([35]Bug 11797) + * [36]wnpa-sec-2015-47 + Ascend file parser crash. ([37]Bug 11794) + * [38]wnpa-sec-2015-48 + NBAP dissector crash. ([39]Bug 11815) + * [40]wnpa-sec-2015-49 + RSL dissector crash. ([41]Bug 11829) + * [42]wnpa-sec-2015-50 + ZigBee ZCL dissector crash. ([43]Bug 11830) + * [44]wnpa-sec-2015-51 + Sniffer file parser crash. ([45]Bug 11827) + + The Windows installers are now built using NSIS 2.50 in order to avoid + [46]DLL hijacking flaws. The following bugs have been fixed: - * Last Address field for IPv6 RPL routing header is interpreted - incorrectly. ([4]Bug 10560) - * Comparing two capture files crashes Wireshark when navigating the - results. ([5]Bug 11098) - * 802.11 frame is not correctly dissected if it contains HT Control. - ([6]Bug 11351) - * GVCP bit-fields not updated. ([7]Bug 11442) - * Tshark crash when specifying ssl.keys_list on CLI. ([8]Bug 11443) - * pcapng: SPB capture length is incorrectly truncated if IDB snaplen - = 0. ([9]Bug 11483) - * pcapng: NRB IPv4 address is endian swapped but shouldn't be. - ([10]Bug 11484) - * pcapng: NRB with options causes file read failure. ([11]Bug 11485) - * pcapng: ISB without if_drop option is shown as max value. ([12]Bug - 11489) - * UNISTIM dissector - Message length not included in offset for - "Select Adjustable Rx Volume". ([13]Bug 11497) + * Zooming out (Ctrl+-) too far crashes Wireshark. ([47]Bug 8854) + * IPv6 Next Header is Unknown yet Wireshark tries parsing an IPv6 + Extension Header. ([48]Bug 9996) + * IPv6 Mobility Header Link-Layer Address Mobility Option is parsed + incorrectly. ([49]Bug 10627) + * Windows Wireshark Installer does not detect WinPcap which is + already installed. ([50]Bug 10867) + * SSL Decrypted Packet Not Decoded As HTTP. ([51]Bug 10984) + * Wireshark crashes when using the VoIP player. ([52]Bug 11596) + * [GSMTAP] Incorrect decoding of MS Radio Access Capability using + alternative coding. ([53]Bug 11599) + * TCP sequence analysis (expert info) does not work in 802.1ah + frames. ([54]Bug 11629) + * No correct GVCP info message for READREG_ACK command. ([55]Bug + 11639) + * Bug in EtherCAT dissector with mailbox response. ([56]Bug 11652) + * NLM v4 statistics crash. ([57]Bug 11654) + * Malformed packet with IPv6 mobility header. ([58]Bug 11728) + * LDAP decode shows invalid number of results for searchResEntry + packets. ([59]Bug 11761) + * IPv6 RPL Routing Header with length of 8 bytes still reads an + address. ([60]Bug 11803) + * g_utf8_validate assertion when reassembling GSM SMS messages + encoded in UCS2. ([61]Bug 11809) + * MPEG2TS NULL pkt: AFC: "Should be 0 for NULL packets" wrong. + ([62]Bug 11921) New and Updated Features @@ -45,24 +96,27 @@ What's New Updated Protocol Support - DIAMETER, GVCP, IEEE 802.11, IPv6, and UNISTIM + 6LoWPAN, 802.1ah, AllJoyn, ANSI A, ASN.1 BER, CLNP, CMS, DCOM, + DIAMETER, DNS, ERF, GSM A, GSM SMS, GTP, GVCP, HiSLIP, IEEE 802.11, + IPv4, IPv6, L2TP, LDAP, MIP6, MP2T, NBAP, NLM, ONC RPC, PCP, RSL, RSVP, + SCTP, SDP, SIGCOMP, SNMP, SPDY, T.38, UMTS FP, and ZigBee ZCL New and Updated Capture File Support - and pcapng + Ascend, ERF, Sniffer, and VeriWave __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from - [14]https://www.wireshark.org/download.html. + [63]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be - found on the [15]download page on the Wireshark web site. + found on the [64]download page on the Wireshark web site. __________________________________________________________________ File Locations @@ -75,78 +129,127 @@ File Locations Known Problems - Dumpcap might not quit if Wireshark or TShark crashes. ([16]Bug 1419) + Dumpcap might not quit if Wireshark or TShark crashes. ([65]Bug 1419) - The BER dissector might infinitely loop. ([17]Bug 1516) + The BER dissector might infinitely loop. ([66]Bug 1516) Capture filters aren't applied when capturing from named pipes. - ([18]Bug 1814) + ([67]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. - ([19]Bug 2234) + ([68]Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. - ([20]Win64 development page) + ([69]Win64 development page) - Resolving ([21]Bug 9044) reopens ([22]Bug 3528) so that Wireshark no + Resolving ([70]Bug 9044) reopens ([71]Bug 3528) so that Wireshark no longer automatically decodes gzip data when following a TCP stream. - Application crash when changing real-time option. ([23]Bug 4035) + Application crash when changing real-time option. ([72]Bug 4035) - Hex pane display issue after startup. ([24]Bug 4056) + Hex pane display issue after startup. ([73]Bug 4056) - Packet list rows are oversized. ([25]Bug 4357) + Packet list rows are oversized. ([74]Bug 4357) Wireshark and TShark will display incorrect delta times in some cases. - ([26]Bug 4985) + ([75]Bug 4985) __________________________________________________________________ Getting Help - Community support is available on [27]Wireshark's Q&A site and on the + Community support is available on [76]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for - all of Wireshark's mailing lists can be found on [28]the web site. + all of Wireshark's mailing lists can be found on [77]the web site. Official Wireshark training and certification are available from - [29]Wireshark University. + [78]Wireshark University. __________________________________________________________________ Frequently Asked Questions - A complete FAQ is available on the [30]Wireshark web site. + A complete FAQ is available on the [79]Wireshark web site. __________________________________________________________________ - Last updated 2015-10-14 09:44:12 PDT + Last updated 2015-12-29 08:48:09 PST References - 1. https://www.wireshark.org/security/wnpa-sec-2015-30.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455 - 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830 - 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10560 - 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11098 - 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11351 - 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11442 - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11443 - 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11483 - 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11484 - 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11485 - 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11489 - 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11497 - 14. https://www.wireshark.org/download.html - 15. https://www.wireshark.org/download.html#thirdparty - 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 - 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 - 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 - 20. https://wiki.wireshark.org/Development/Win64 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 - 27. https://ask.wireshark.org/ - 28. https://www.wireshark.org/lists/ - 29. http://www.wiresharktraining.com/ - 30. https://www.wireshark.org/faq.html + 1. https://www.wireshark.org/security/wnpa-sec-2015-31.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602 + 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11835 + 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11841 + 5. https://www.wireshark.org/security/wnpa-sec-2015-32.html + 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602 + 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11606 + 8. https://www.wireshark.org/security/wnpa-sec-2015-33.html + 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610 + 10. https://www.wireshark.org/security/wnpa-sec-2015-34.html + 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11607 + 12. https://www.wireshark.org/security/wnpa-sec-2015-35.html + 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887 + 14. https://www.wireshark.org/security/wnpa-sec-2015-36.html + 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887 + 16. https://www.wireshark.org/security/wnpa-sec-2015-37.html + 17. https://www.wireshark.org/security/wnpa-sec-2015-38.html + 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10988 + 19. https://www.wireshark.org/security/wnpa-sec-2015-39.html + 20. https://www.wireshark.org/security/wnpa-sec-2015-40.html + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548 + 22. https://www.wireshark.org/security/wnpa-sec-2015-41.html + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11767 + 24. https://www.wireshark.org/security/wnpa-sec-2015-42.html + 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11826 + 27. https://www.wireshark.org/security/wnpa-sec-2015-43.html + 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792 + 29. https://www.wireshark.org/security/wnpa-sec-2015-44.html + 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11789 + 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11791 + 32. https://www.wireshark.org/security/wnpa-sec-2015-45.html + 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793 + 34. https://www.wireshark.org/security/wnpa-sec-2015-46.html + 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11797 + 36. https://www.wireshark.org/security/wnpa-sec-2015-47.html + 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794 + 38. https://www.wireshark.org/security/wnpa-sec-2015-48.html + 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11815 + 40. https://www.wireshark.org/security/wnpa-sec-2015-49.html + 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829 + 42. https://www.wireshark.org/security/wnpa-sec-2015-50.html + 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830 + 44. https://www.wireshark.org/security/wnpa-sec-2015-51.html + 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11827 + 46. http://nsis.sourceforge.net/Docs/AppendixF.html + 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8854 + 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9996 + 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627 + 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10867 + 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10984 + 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11596 + 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11599 + 54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11629 + 55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11639 + 56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11652 + 57. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11654 + 58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11728 + 59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11761 + 60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11803 + 61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11809 + 62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11921 + 63. https://www.wireshark.org/download.html + 64. https://www.wireshark.org/download.html#thirdparty + 65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 66. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 67. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 + 68. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 69. https://wiki.wireshark.org/Development/Win64 + 70. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 + 71. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 + 72. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 73. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 + 74. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 + 75. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 76. https://ask.wireshark.org/ + 77. https://www.wireshark.org/lists/ + 78. http://www.wiresharktraining.com/ + 79. https://www.wireshark.org/faq.html diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc index 0e444aec74..411da626bc 100644 --- a/docbook/release-notes.asciidoc +++ b/docbook/release-notes.asciidoc @@ -11,7 +11,7 @@ used for troubleshooting, analysis, development and education. // Link templates: ws-buglink:5000[] ws-buglink:6000[Wireshark bug] cve-idlink:2013-2486[] -The following vulnerabilities have been fixed. +The following vulnerabilities have been fixed: * ws-salink:2015-31[] + @@ -109,7 +109,7 @@ SCTP dissector crash. * ws-salink:2015-42[] + 802.11 decryption crash. -// Fixed in master: g40b2831, 83f2818 +// Fixed in master: g40b2831, g83f2818 // Fixed in master-2.0: gbf1fa88, gfc3b6a5 // Fixed in master-1.12: ga6e8fc8, g8110a70 (ws-buglink:11790[], ws-buglink:11826[]) @@ -127,7 +127,7 @@ DIAMETER dissector crash. * ws-salink:2015-44[] + VeriWave file parser crashes. -// Fixed in master: gb8fa3d4, 185911d +// Fixed in master: gb8fa3d4, g185911d // Fixed in master-2.0: g135c8f0, ge4267dd // Fixed in master-1.12: gfef89fc, g51ccf92 (ws-buglink:11789[], ws-buglink:11791[]) @@ -196,12 +196,46 @@ Sniffer file parser crash. (ws-buglink:11827[]) //cve-idlink:2015-XXXX[] +The Windows installers are now built using NSIS 2.50 in order to avoid +http://nsis.sourceforge.net/Docs/AppendixF.html[DLL hijacking flaws]. + The following bugs have been fixed: //* Wireshark always manages to score tickets for Burning Man, Coachella, and // SXSW while you end up working double shifts. (ws-buglink:0000[]) // cp /dev/null /tmp/buglist.txt ; for bugnumber in `git log --stat v1.12.9rc0..| grep ' Bug:' | cut -f2 -d: | sort -n -u ` ; do gen-bugnote $bugnumber; pbpaste >> /tmp/buglist.txt; done +* Zooming out (Ctrl+-) too far crashes Wireshark. (ws-buglink:8854[]) + +* IPv6 Next Header is Unknown yet Wireshark tries parsing an IPv6 Extension Header. (ws-buglink:9996[]) + +* IPv6 Mobility Header Link-Layer Address Mobility Option is parsed incorrectly. (ws-buglink:10627[]) + +* Windows Wireshark Installer does not detect WinPcap which is already installed. (ws-buglink:10867[]) + +* SSL Decrypted Packet Not Decoded As HTTP. (ws-buglink:10984[]) + +* Wireshark crashes when using the VoIP player. (ws-buglink:11596[]) + +* [GSMTAP] Incorrect decoding of MS Radio Access Capability using alternative coding. (ws-buglink:11599[]) + +* TCP sequence analysis (expert info) does not work in 802.1ah frames. (ws-buglink:11629[]) + +* No correct GVCP info message for READREG_ACK command. (ws-buglink:11639[]) + +* Bug in EtherCAT dissector with mailbox response. (ws-buglink:11652[]) + +* NLM v4 statistics crash. (ws-buglink:11654[]) + +* Malformed packet with IPv6 mobility header. (ws-buglink:11728[]) + +* LDAP decode shows invalid number of results for searchResEntry packets. (ws-buglink:11761[]) + +* IPv6 RPL Routing Header with length of 8 bytes still reads an address. (ws-buglink:11803[]) + +* g_utf8_validate assertion when reassembling GSM SMS messages encoded in UCS2. (ws-buglink:11809[]) + +* MPEG2TS NULL pkt: AFC: "Should be 0 for NULL packets" wrong. (ws-buglink:11921[]) === New and Updated Features @@ -215,7 +249,42 @@ There are no new protocols in this release. === Updated Protocol Support --sort-and-group-- +6LoWPAN +802.1ah +AllJoyn +ANSI A +ASN.1 BER +CLNP +CMS +DCOM +DIAMETER +DNS +ERF +GSM A +GSM SMS +GTP +GVCP +HiSLIP +IEEE 802.11 +IPv4 +IPv6 +L2TP +LDAP +MIP6 +MP2T NBAP +NLM +ONC RPC +PCP +RSL +RSVP +SCTP +SDP +SIGCOMP +SNMP +SPDY +T.38 +UMTS FP ZigBee ZCL --sort-and-group-- @@ -223,6 +292,10 @@ ZigBee ZCL //There is no new or updated capture file support in this release. --sort-and-group-- +Ascend +ERF +Sniffer +VeriWave --sort-and-group-- == Getting Wireshark diff --git a/epan/CMakeLists.txt b/epan/CMakeLists.txt index 409de4bf14..e889851aec 100644 --- a/epan/CMakeLists.txt +++ b/epan/CMakeLists.txt @@ -1680,7 +1680,7 @@ add_library(epan ${LINK_MODE_LIB} add_dependencies(epan gitversion) -set(FULL_SO_VERSION "5.0.8") +set(FULL_SO_VERSION "5.0.9") set_target_properties(epan PROPERTIES COMPILE_DEFINITIONS "WS_BUILD_DLL") set_target_properties(epan PROPERTIES LINK_FLAGS "${WS_LINK_FLAGS}") diff --git a/version.conf b/version.conf index 6dedd7c96a..9480b2f829 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add a "rc" to the version. -enable: 1 -pkg_format: rc0-%# -pkg_enable: 1 +#enable: 1 +#pkg_format: rc0-%# +#pkg_enable: 1 # Final release: Disable package version stamps. -#enable: 1 -#pkg_format: -#pkg_enable: 0 +enable: 1 +pkg_format: +pkg_enable: 0 diff --git a/wiretap/CMakeLists.txt b/wiretap/CMakeLists.txt index 5ecfbbb431..a66386f095 100644 --- a/wiretap/CMakeLists.txt +++ b/wiretap/CMakeLists.txt @@ -113,7 +113,7 @@ add_library(wiretap ${LINK_MODE_LIB} ${WIRETAP_FILES} ) -set(FULL_SO_VERSION "4.0.8") +set(FULL_SO_VERSION "4.0.9") set_target_properties(wiretap PROPERTIES COMPILE_DEFINITIONS "WS_BUILD_DLL") set_target_properties(wiretap PROPERTIES LINK_FLAGS "${WS_LINK_FLAGS}") |