diff options
author | Gerald Combs <gerald@wireshark.org> | 2018-05-22 10:53:19 -0700 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2018-05-22 17:54:57 +0000 |
commit | c43eaa1b7be098dad15ffb33f987be5a907b88bd (patch) | |
tree | c8dce9fb627b5933be51d6b5d07547ede9227e04 | |
parent | ff3a6da0c5751d234cea1e23b2f3300270aece60 (diff) | |
download | wireshark-c43eaa1b7be098dad15ffb33f987be5a907b88bd.tar.gz wireshark-c43eaa1b7be098dad15ffb33f987be5a907b88bd.tar.bz2 wireshark-c43eaa1b7be098dad15ffb33f987be5a907b88bd.zip |
Build 2.2.15.wireshark-2.2.15v2.2.15
Change-Id: Iecf56ebf4a305ee35cc959ae6610f8035b02c011
Reviewed-on: https://code.wireshark.org/review/27720
Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r-- | ChangeLog | 769 | ||||
-rw-r--r-- | NEWS | 181 | ||||
-rw-r--r-- | version.conf | 12 |
3 files changed, 838 insertions, 124 deletions
@@ -0,0 +1,769 @@ +commit ff3a6da0c5 +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue May 22 08:43:07 2018 -0700 + + Qt: Remove the capture information dialog checkbox. + + Remove the "Show extra capture information dialog" checkbox from the + capture options dialog. That dialog will be in 3.0, but the checkbox + doesn't do anything other than toggle the capture.show_info preference + in 2.0 to 2.6. + + Change-Id: I9cc64622a3145da62ee52125a258f4dbe2b91e17 + Ping-bug: 12004 + Reviewed-on: https://code.wireshark.org/review/27715 + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 2c69a5a215 +Author: Gerald Combs <gerald@wireshark.org> +Date: Mon May 21 11:16:53 2018 -0700 + + Prep for 2.2.15. + + Change-Id: I8a10851ba8e049e0aaf5c5585e89bdcc2a9725aa + Reviewed-on: https://code.wireshark.org/review/27690 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit ee971ce1da +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun May 20 14:40:12 2018 -0700 + + Make the two file type descriptions for WTAP_FILE_TYPE_SUBTYPE_MPLOG the same. + + Change-Id: Id800bf9ea0617398d1eaede1fbacfa61ed8ebe8c + Reviewed-on: https://code.wireshark.org/review/27674 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 544aba3263bcfaeb4aeb629974acf390b04b5184) + Reviewed-on: https://code.wireshark.org/review/27677 + (cherry picked from commit 476d80071a9787026379d1da847a5647ce5a17a3) + Reviewed-on: https://code.wireshark.org/review/27679 + +commit 6647728d79 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun May 20 08:46:56 2018 +0000 + + [Automatic update for 2018-05-20] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I58c4eb87022bfcac17b3d5367c18f83afb7c7ce3 + Reviewed-on: https://code.wireshark.org/review/27669 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit af6e6237f4 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 19 19:59:21 2018 -0700 + + Get rid of add_async_dns_ipv4(). + + We don't have add_async_dns_ipv6(), we just do the same stuff inline in + host_lookup6(); this removes an irrelevant difference between + host_lookup() and host_lookup6(). + + Change-Id: Ib4aa1783ddec1bc390e2a7f64c87f1c8441fa849 + Reviewed-on: https://code.wireshark.org/review/27661 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 8ee56d29828c23e45fa771d6b8f50b74e9185a14) + Reviewed-on: https://code.wireshark.org/review/27664 + +commit 2f56988f01 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 19 18:35:18 2018 -0700 + + Make private variables static. + + Change-Id: I0844795597cec83dfb6752fb986d2a9957789530 + Reviewed-on: https://code.wireshark.org/review/27657 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 724877497a7eab2cb28d5531233e083fcf9ed253) + Reviewed-on: https://code.wireshark.org/review/27660 + +commit beaebe91b1 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri May 18 09:03:29 2018 +0200 + + proto.c: do not dereference a NULL pointer in proto_item_get_len() on first pass + + Like the proto_item_set_XXX functions, check proto_item pointer validity + before using it. It can be NULL on first pass for example. + + Bug: 14703 + Change-Id: I94957e0738d66f99793682dc0ea1c7c0a65ceecd + Reviewed-on: https://code.wireshark.org/review/27629 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 40dbc0ccf26152a058484368526b7bd70c8928c1) + Reviewed-on: https://code.wireshark.org/review/27636 + +commit a55b36c51f +Author: Peter Wu <peter@lekensteyn.nl> +Date: Mon May 14 17:29:52 2018 +0200 + + gsm_a_dtap: fix off-by-one buffer overflow (write) + + The output buffer needs one more byte for the string terminator. + + Bug: 14688 + Change-Id: I7d606aa8fb769fd65ba894f0472ada3543a1e3cd + Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6420 + Reviewed-on: https://code.wireshark.org/review/27539 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 48fac2a18debb2969413e03f3d88bbb9c31500ae) + Reviewed-on: https://code.wireshark.org/review/27560 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit ab8a33ef08 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Mon May 14 12:27:15 2018 +0200 + + tvbuff: make tvb_bytes_exist fail with negative values + + tvb_generic_clone_offset_len uses tvb_bytes_exist to check that the + requested tvb data is actually available. It did not expect negative + values, that would result in an overly large memory allocation. + + Bug: 14678 + Change-Id: Ie80095a381e55ca5dbbd5c9d835243549d0b212e + Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7179 + Reviewed-on: https://code.wireshark.org/review/27526 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit d80acae40d14efeb857258ca923637b590dd6be9) + Reviewed-on: https://code.wireshark.org/review/27535 + +commit 4425716ddb +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sun May 13 16:27:27 2018 +0200 + + dns: fix null pointer deref for empty name in SRV record + + Per RFC 2782, the name should follow the "_Service._Proto.Name" format. + If a malformed packet does not adhere to this and provides a zero-length + name, then wmem_strsplit returns NULL. + + Bug: 14681 + Change-Id: I7b9935238a9800a1526c8b694fd2c63d3b488d0b + Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7416 + Reviewed-on: https://code.wireshark.org/review/27499 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 843735e0efe03f601ed69f69e5295974aad927b2) + Reviewed-on: https://code.wireshark.org/review/27532 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit 5f8bd0c94f +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Sun Sep 10 17:47:36 2017 +0200 + + DNS: replace g_strsplit by wmem_strsplit + + It avoids leaking memory in case an exception is thrown during + dissection + + Change-Id: Iab72bcb4cc1ac56e7ce5ff2693e3111aead03e7d + Reviewed-on: https://code.wireshark.org/review/23464 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 85d742ef26970e35d16f16a9bea04a12ff618e17) + Reviewed-on: https://code.wireshark.org/review/27531 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit ccb1ac3c8c +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sun May 13 15:01:54 2018 +0200 + + Q.931: fix use-after-free (write) of "q931_pi" + + The dissect_q931_number_ie (and indirectly dissect_q931_cause_ie_unsafe) + write to the "q931_pi" structure which seems private to the q931 + dissector, but can in fact be called through other dissectors (isup) as + well. Normally this structure is initialized in "dissect_q931_pdu" and + invalidated at the end of the function, but a malformed packet can + prevent the cleanup. In the next packet, a different dissector can thus + trigger a use-after-free via "dissect_q931_number_ie". + + Rename "dissect_q931_cause_ie_unsafe" since "unsafe" meant that external + dissectors could not call it directly (see commit a83a87e9ca). + + Based on commit 197ceddab109, it seems that the intended purpose of the + structure is to provide information to the VoIP Calls dialog, but it + would only be used when called through dissect_q931_pdu. Dissectors like + isup have their own routines to provide call information, but as a + side-effect of code sharing the problematic code path was reached. + + Bug: 14689 + Change-Id: I871525db560f24690ade9a0b944c6d0e655ed34b + Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6711 + Reviewed-on: https://code.wireshark.org/review/27495 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit d08a53a7b9ebf723816f224897c68aa652589050) + Reviewed-on: https://code.wireshark.org/review/27523 + +commit 14f1a1d749 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun May 13 08:41:50 2018 +0000 + + [Automatic update for 2018-05-13] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Ica9f0c38b965b50860e5cecb4b8ffc69622b0958 + Reviewed-on: https://code.wireshark.org/review/27489 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 961b518738 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat May 12 13:42:38 2018 -0700 + + Report the appropriate secondary message for ENOSPC and EDQUOT. + + Don't tell the user that, if they run out of space or go over their disk + quote, they should report that as a Wireshark bug; instead, tell them + that they're going to need to free up some space or do the capture to a + different file system. + + Clean up some argument types, and get rid of tabs in indentation, while + we're at it. + + Change-Id: I7839f38c14253a114e7e02e762243df5e09682ef + Ping-Bug: 14677 + Reviewed-on: https://code.wireshark.org/review/27472 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 315599fff666cf1ad41902d05f1c36421962b79a) + Reviewed-on: https://code.wireshark.org/review/27481 + +commit 4c4daface2 +Author: Sven Eckelmann <sven@narfation.org> +Date: Thu May 10 10:22:10 2018 +0200 + + batadv: Fix label for batadv.unicast_tvlv.src + + Change-Id: I73c06bb84efc874412b534348b9d1261b8ed5164 + Fixes: v1.99.1rc0-546-g4cc4315793 ("batadv: Add dissector support for batadv v15") + Signed-off-by: Sven Eckelmann <sven@narfation.org> + Reviewed-on: https://code.wireshark.org/review/27440 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Dario Lombardo <lomato@gmail.com> + (cherry picked from commit 04fffbbe9faccbd320edf5556b5cea57127d5225) + Reviewed-on: https://code.wireshark.org/review/27473 + Petri-Dish: Dario Lombardo <lomato@gmail.com> + +commit afc9786f03 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed May 9 09:31:44 2018 -0700 + + Always explicitly set tm_isdst before calling mktime(). + + Except in rare cases, we want to set it to -1 so that we let mktime() + determine whether DST/Summer Time was in effect at the given date and + time rather than pretending that we know whether it's in effect or not. + + Change-Id: I0ea75317dd308a515cedf4d1260b583e1592cc9b + Reviewed-on: https://code.wireshark.org/review/27431 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e7d24c606cdb460e835f7d7553d7b82e1ee11eac) + Reviewed-on: https://code.wireshark.org/review/27434 + +commit 4730856fd9 +Author: Dario Lombardo <lomato@gmail.com> +Date: Wed May 9 12:39:21 2018 +0200 + + proto: don't overrun buffer. + + This is shown by a bunch of coverity reports all pointing at this line. + Every buffer has a ITEM_LABEL_LENGTH, but label_mark_truncated access it + at ITEM_LABEL_LENGTH (off-by-one). + + CIDs: + 1435461 + 1435462 + 1435465 + 1435466 + 1435471 + 1435472 + 1435477 + 1435481 + 1435483 + 1435484 + 1435485 + 1435489 + 1435492 + 1435500 + + Fixes: v1.11.3-rc1-1837-gf94674d2fb ("truncate UTF-8 strings only at the boundary between two characters") + Change-Id: I3781c36594f7db880bc9f76b64d261dbc498c0ce + Reviewed-on: https://code.wireshark.org/review/27425 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Dario Lombardo <lomato@gmail.com> + (cherry picked from commit 4b6224a67326dc72e428e8f6606b8ae10059c0bd) + Reviewed-on: https://code.wireshark.org/review/27426 + Petri-Dish: Dario Lombardo <lomato@gmail.com> + +commit 314e8112aa +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue May 8 20:47:58 2018 -0700 + + You have to set tm_isdst before calling mktime(). + + You either need to tell mktime() that 1) DST/Summer Time is in effect, + 2) DST/Summer Time isn't in effect, or 3) we don't know whether + DST/Summer Time is in effect, you figure it out. + + We set tm_isdst to -1, to choose option 3), which is what we want. + + Fixes Coverity CID 1435496. + + Change-Id: I0f22ef1201ee8abefb3fa75aa3432b021fb13cfd + Reviewed-on: https://code.wireshark.org/review/27408 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 4513c66b1a2c7f7feb729e7e4e576b390395a123) + Reviewed-on: https://code.wireshark.org/review/27418 + +commit 950e02b082 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue May 8 20:43:22 2018 -0700 + + You have to set tm_isdst before calling mktime(). + + You either need to tell mktime() that 1) DST/Summer Time is in effect, + 2) DST/Summer Time isn't in effect, or 3) we don't know whether + DST/Summer Time is in effect, you figure it out. + + We set tm_isdst to -1, to choose option 3), which is what we want. + + Fixes Coverity CID 1435496. + + Change-Id: Iff24e51807ab42c0e6d9629f72848ad9f8d325fb + Reviewed-on: https://code.wireshark.org/review/27404 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 270f0554d86ad5a7d6455f8eccbf057acdc69a91) + Reviewed-on: https://code.wireshark.org/review/27407 + +commit 4dac043fc3 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun May 6 08:40:42 2018 +0000 + + [Automatic update for 2018-05-06] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: If19ccaf7e09e7f6eaab406b11e170fece226a58b + Reviewed-on: https://code.wireshark.org/review/27375 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 630c237ac9 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sat May 5 00:46:20 2018 +0200 + + nettrace_3gpp_32_423: fix memleak and copy of uninitialized memory + + When protocol="map", but the name attribute value is invalid, a memleak + occurs. Observe also that dissector_table_str is 22 bytes (21 characters + plus nul) and rounding up to a multiple of 4 means that 2 bytes of + uninitialized memory could be copied. Avoid that by copying the actual + length. Memory leak was found by Clang Static Analyzer. + + Change-Id: I41f5b104449e108191e505611411a8fb18f1f5db + Fixes: v2.1.0rc0-2545-g4b4c7a76c3 ("[Nettrace] Add parsing of some HSS records.") + Reviewed-on: https://code.wireshark.org/review/27350 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 7c9f333ad0f79d695f530e05cdcceceb7d54d545) + Reviewed-on: https://code.wireshark.org/review/27366 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit d1abbf6e0e +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri May 4 23:07:28 2018 -0700 + + Fix the check for getexecname(). + + We want HAVE_GETEXECNAME set if it's available, so use AC_CHECK_FUNCS() + rather than AC_CHECK_FUNC() - the latter doesn't do anything other than + check, and expects to have "if it's found" or "if it isn't found" code, + the former will define a HAVE_ macro even with no "if it's found" or "if + it isn't found" code. + + Change-Id: I0e7ab2b8077734b5b9d820b689136f1ef8859e61 + Reviewed-on: https://code.wireshark.org/review/27355 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 2613d1d0ee1568d3c1abec2cef85293933b4d176) + Reviewed-on: https://code.wireshark.org/review/27357 + +commit 57005c1dac +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri May 4 23:00:29 2018 -0700 + + On Solaris, check for getexecname in CMake. + + We expect it to be checked for in wsutil/filesystem.c, so we should + check for it. It's a Solarisism, so check for it only on Solaris. + + Change-Id: I09104c17d2ec91c74862b63e735c32a9d188f2a6 + Reviewed-on: https://code.wireshark.org/review/27351 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit f447aa7dd7f0e36916847b8bb7193fecc42ddc89) + Reviewed-on: https://code.wireshark.org/review/27354 + +commit b4e7dda3f9 +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu May 3 19:25:18 2018 -0700 + + Fix function declaration of ws_buffer_length(). + + This makes it match 1) the way the function is defined, if it is defined + and 2) the type returned if it's a macro, not a function. + + Change-Id: I708a44d2d20f44e58d6ae0228a11e622e7648022 + Reviewed-on: https://code.wireshark.org/review/27320 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 0d9a7455a6c35b3573086bb53e790b3936c05063) + Reviewed-on: https://code.wireshark.org/review/27323 + +commit 75cbe8204e +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed May 2 16:18:43 2018 -0700 + + Windows: Fix our WinSparkle version. + + Change-Id: I2cecbd68e6d67b3072d96f99f9e827b545a3329f + Reviewed-on: https://code.wireshark.org/review/27294 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 0420873803 +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed May 2 11:33:03 2018 -0700 + + Windows: Upgrade WinSparkle to 0.5.7. + + Bug: 14642 + Change-Id: If29813ce84d3ee6fe8e63deefb8cecc021e2b63c + Reviewed-on: https://code.wireshark.org/review/27280 + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 4c3f8c8a75 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Wed May 2 18:29:56 2018 +0200 + + GTP: fix compilation with gcc 8 + + error: cast between incompatible function types from ‘void (*)(const void *, void *, void *)’ to ‘gboolean (*)(const void *, void *, void *)’ {aka ‘int (*)(const void *, void *, void *)’} [-Werror=cast-function-type] + + Change-Id: If93eb9a4f38b622ae5dfaf9ed1e2c3d257141105 + Reviewed-on: https://code.wireshark.org/review/27260 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 966c5957822a974ddd4f0558db0eccbbb7afe290) + Reviewed-on: https://code.wireshark.org/review/27275 + +commit f177008b04 +Author: Darius Davis <darius@vmware.com> +Date: Sun Apr 29 15:48:53 2018 +1000 + + LDSS: Fix a read overrun in dissect_ldss_transfer. + + dissect_ldss_transfer had a trivial read overrun: "line" was not + NUL-terminated, and strtol/g_ascii_strtoull will keep reading and discarding + any leading whitespace, so a malformed LDSS packet (with only whitespace + characters following the tag on a "Size:"/"Start:"/"Compression:" line) could + trigger a read overrun. + + Let's replace the tvb_memdup with tvb_get_string_enc, which does some checking + of the input characters (which, it seems, must always be ASCII), and produces a + neat NUL-terminated string. + + Testing Done: On Linux x64, ran "valgrind tshark -r fuzz-2018-04-23-14422.pcap" + without the fix (to reproduce the failure), and then with the fix, and + observed that no errors were reported anymore after the fix. 60,000 iters of + fuzz-test with ldss_filtered.pcap as input, plus 1,000 iters under valgrind. + Launched wireshark and opened ldss_filtered.pcap, and examined the dissection + of the "ldss and tcp" packets; All looks good. + + Bug: 14615 + Change-Id: I3fccc4ffbe315a3cff6ea03cc7db37f884b0582c + Reviewed-on: https://code.wireshark.org/review/27204 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit 295abe2e83ba8428e84e7ff9b2f6f94ae948fa76) + Reviewed-on: https://code.wireshark.org/review/27223 + +commit 0f87e8ec6f +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Apr 29 08:40:16 2018 +0000 + + [Automatic update for 2018-04-29] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I48b3a4092ca28489d2fffb67695070da8f4d73a0 + Reviewed-on: https://code.wireshark.org/review/27202 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 32309cbaa4 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat Apr 28 12:10:00 2018 -0700 + + Pick the *first* usable file type as the default, not the *last* one. + + In wtap_get_savable_file_types_subtypes(), in the search for a default + file type to use, stop as soon as we've found a usable file type, don't + keep searching. + + Bug: 14601 + Change-Id: Iff4ffe14f5ad07271c49a761e0856059353c1634 + Reviewed-on: https://code.wireshark.org/review/27193 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 1eb04d7ecb76c79cf681798b51aaa51aad938325) + Reviewed-on: https://code.wireshark.org/review/27196 + +commit 04204c9847 +Author: Joakim Karlsson <oakimk@gmail.com> +Date: Tue Apr 24 20:20:33 2018 +0200 + + cmake: remove warnings -Werror=old-style-definition + + see https://cmake.org/Bug/bug_relationship_graph.php?bug_id=15058 + + Change-Id: I325f476b145a542e987a13bedd1f95a7d8faba94 + Reviewed-on: https://code.wireshark.org/review/27121 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 5994c902b452f038df82a7497d1561503c3e1fe0) + Reviewed-on: https://code.wireshark.org/review/27127 + +commit 1c3395a2be +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Apr 22 20:31:26 2018 -0700 + + Add more bounds checks. + + If the calculated packet length in the header is bigger than the actual + packet length value from the header, reject the packet. + + Change-Id: I86cb24c66ee0d6fd2ed6f9240d44c1adc5f0bf91 + Reviewed-on: https://code.wireshark.org/review/27087 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 83ecd467765408847afe6e5acdd7ab974c621f6e) + Reviewed-on: https://code.wireshark.org/review/27090 + +commit 811cfb5fea +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Apr 22 08:48:47 2018 +0000 + + [Automatic update for 2018-04-22] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I45c818a3d95e0d38589723a817348d55e88f2020 + Reviewed-on: https://code.wireshark.org/review/27075 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 102570f45e +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Apr 20 09:46:58 2018 -0700 + + Fix cpu_diag_eventid_fix_names table. + + For a value_string_ext, the values must be in numerical order. + + Change-Id: I43063b59a8c15d7d1fcdca07d4ae9fd89917427d + Reviewed-on: https://code.wireshark.org/review/27058 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit ccf495a8382bf62f8f90d1239dddb7c536aeface) + Reviewed-on: https://code.wireshark.org/review/27061 + +commit fddba12426 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Apr 18 15:46:00 2018 -0700 + + Fix tapo. + + Change-Id: I1e5a39437e274aa8923e996241d2264dbd63e806 + Reviewed-on: https://code.wireshark.org/review/27014 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit d5c4c6972ed019e1cf52d268baecd41726760b90) + Reviewed-on: https://code.wireshark.org/review/27017 + +commit abd55373a0 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Apr 15 16:45:59 2018 +0000 + + [Automatic update for 2018-04-15] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I9e4937cfddc7a6fae9008b77ac1257311475cfa3 + Reviewed-on: https://code.wireshark.org/review/26956 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit a077aeb178 +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu Apr 12 17:56:51 2018 -0700 + + Fix the length of the payload of a private_1 or audio PES packet. + + The length field's value doesn't include the length of the length field + itself. + + Change-Id: Icd0cc2721a32212296929d248b9305b0f4a051e6 + Reviewed-on: https://code.wireshark.org/review/26920 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 05615015057f13197d5694c426bccccfa7de5f5f) + Reviewed-on: https://code.wireshark.org/review/26923 + +commit c685ca1ba3 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Apr 11 22:01:11 2018 -0700 + + Update a comment. + + We don't just reassemble DOCSIS MAC frames, we reassemble other forms of + higher-level packet atop an MPEG Transport Stream as well. + + Change-Id: If6e709a8d2d3e574fbaedb1fcac74797c5664aa5 + Reviewed-on: https://code.wireshark.org/review/26905 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit d0d0cf05cc6872c7d49f1ed7b2432ba97a66331f) + Reviewed-on: https://code.wireshark.org/review/26908 + +commit 4ac70ca529 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Apr 11 19:27:57 2018 -0700 + + Need to flag a variable as volatile, due to the use of exceptions. + + The exception mechanism is setjmp/longjmp-based, so we need to mark + offset as volatile, otherwise the longjmp might not restore its value. + + Change-Id: Ib63070bbbbe1f16a93cb58aa7ee5ef2a5488df8a + Reviewed-on: https://code.wireshark.org/review/26901 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 148f39d900b516cac575d7de689a44545a663c70) + Reviewed-on: https://code.wireshark.org/review/26904 + +commit 0416a3b581 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Apr 11 17:45:46 2018 -0700 + + If a subdissector throws an exception, catch it and continue. + + That way, some exception thrown higher in the protocol stack doesn't + stop us from dissecting the next TSP. + + Change-Id: Ib756e5d62806caf0edd4e4ded18bb94000653d39 + Reviewed-on: https://code.wireshark.org/review/26897 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 81f184bc00b938807cfdee72dc6f8d49412e26c6) + Reviewed-on: https://code.wireshark.org/review/26900 + +commit c04d5907aa +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Tue Apr 10 17:11:24 2018 +0200 + + NBSS: take into account snaplen when creating the TVB subset + + Otherwise you can trigger an exception interrupting the packet dissection + when the snaplen defined is shorter than the payload length + + Bug: 14598 + Change-Id: Ibeb6482495ed67c7669574bdcd7c429523318428 + Reviewed-on: https://code.wireshark.org/review/26858 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> + (cherry picked from commit 526a328d839cebf8d52dfcfdd479f12e83a28d3a) + Conflicts: + epan/dissectors/packet-nbt.c + Reviewed-on: https://code.wireshark.org/review/26883 + +commit a797085256 +Author: Adrian Granados <adrian@adriangranados.com> +Date: Mon Apr 9 16:21:27 2018 -0400 + + ieee80211: fixes min and max power values in item text (they are signed). + + This change further extends the fix for bug 14593 by making sure the + values min, max values shown in the item's info text match the + item's children values. + + Change-Id: Ibac39e1f21a892a02753c3cf1604ed3b14eadc52 + Reviewed-on: https://code.wireshark.org/review/26832 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e085119b66722eeeaa409b65e5cbb7053e171841) + Reviewed-on: https://code.wireshark.org/review/26837 + +commit 9403b4d3e8 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Apr 8 08:35:32 2018 +0000 + + [Automatic update for 2018-04-08] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I0fdba9dcbaf9e9e552b77f087b6cc60c3c796c47 + Reviewed-on: https://code.wireshark.org/review/26802 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 9b013536c1 +Author: Harald Welte <laforge@gnumonks.org> +Date: Wed Mar 21 19:42:46 2018 +0100 + + BSSMAP: Fix definition of Speech Version Indication for EFR (FR2) + + 3GPP TS 48.008 Section 3.2.2.11 is quite clear on the definitions + of the "permitted speech version indication". + + The Wireshark BSSMAP dissector so far got it wrong: + * 0x11 is "Full Rate Version 2" (aka GSM-EFR) + * the short version is not FR12 but FR2 + + Change-Id: I6835083389e465c791cea5a240ebc434f677b82c + Reviewed-on: https://code.wireshark.org/review/26790 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 5b0c6f9e058bb07df970956f01f0e15d1ed15af6) + Reviewed-on: https://code.wireshark.org/review/26793 + +commit 4b5c5871a8 +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu Apr 5 11:48:01 2018 -0700 + + Don't install PortAudio if we're not installing GTK+. + + Change-Id: I99bad59b34ff0688cf527ae69b5e48e4c14e7380 + Reviewed-on: https://code.wireshark.org/review/26758 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit c4da7ed843527ac75bc46d74e43de1b61fa5c5f5) + Reviewed-on: https://code.wireshark.org/review/26761 + +commit 2fdc87876b +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Apr 3 14:54:22 2018 -0700 + + 2.2.14 → 2.2.15. + + Change-Id: I2c28f083133ff7c2ee5a6bf66458c66fc37fa79a + Reviewed-on: https://code.wireshark.org/review/26732 + Reviewed-by: Gerald Combs <gerald@wireshark.org> @@ -1,4 +1,4 @@ - Wireshark 2.2.14 Release Notes + Wireshark 2.2.15 Release Notes __________________________________________________________________ What is Wireshark? @@ -12,59 +12,25 @@ What's New Bug Fixes The following vulnerabilities have been fixed: - * [1]wnpa-sec-2018-15 - The MP4 dissector could crash. ([2]Bug 13777) - * [3]wnpa-sec-2018-16 - The ADB dissector could crash. ([4]Bug 14460) - * [5]wnpa-sec-2018-17 - The IEEE 802.15.4 dissector could crash. ([6]Bug 14468) - * [7]wnpa-sec-2018-18 - The NBAP dissector could crash. ([8]Bug 14471) - * [9]wnpa-sec-2018-19 - The VLAN dissector could crash. ([10]Bug 14469) - * [11]wnpa-sec-2018-20 - The LWAPP dissector could crash. ([12]Bug 14467) - * [13]wnpa-sec-2018-23 - The Kerberos dissector could crash. ([14]Bug 14576) - * tshark memory leaks with asan / valgrind [tn3270] (1/10). ([15]Bug - 14480) - * tshark memory leaks with asan / valgrind [isup] (2/10). ([16]Bug - 14481) - * tshark memory leaks with asan / valgrind [lapd] (3/10). ([17]Bug - 14482) - * tshark memory leaks with asan / valgrind [smb2] (4/10). ([18]Bug - 14483) - * tshark memory leaks with asan / valgrind [Inter-ORB] (5/10). - ([19]Bug 14484) - * tshark memory leaks with asan / valgrind [oids] (6/10). ([20]Bug - 14485) - * tshark memory leaks with asan / valgrind [multipart] (7/10). - ([21]Bug 14486) - * tshark memory leaks with asan / valgrind [h223] (8/10). ([22]Bug - 14487) - * tshark memory leaks with asan / valgrind [Co-Pilot] (9/10). - ([23]Bug 14488) + * [1]wnpa-sec-2018-25 + The LDSS dissector could crash. ([2]Bug 14615) + * [3]wnpa-sec-2018-28 + Multiple dissectors could consume excessive memory. ([4]Bug 14678) + * [5]wnpa-sec-2018-29 + The DNS dissector could crash. ([6]Bug 14681) + * [7]wnpa-sec-2018-30 + The GSM A DTAP dissector could crash. ([8]Bug 14688) + * [9]wnpa-sec-2018-31 + The Q.931 dissector could crash. ([10]Bug 14689) + * [11]wnpa-sec-2018-33 + Multiple dissectors could crash. ([12]Bug 14703) The following bugs have been fixed: - * Lua script calling Ethernet dissector runs OK in 1.12.4 but crashes - in later releases. ([24]Bug 14293) - * PEEKREMOTE dissector lacks 80mhz support, short preamble support - and spatial streams encoding. ([25]Bug 14452) - * Typo error in enumeration value of speech version identifier. - ([26]Bug 14528) - * WCCP logical error in CHECK_LENGTH_ADVANCE_OFFSET macros. ([27]Bug - 14538) - * Buildbot crash output: fuzz-2018-03-19-19114.pcap. ([28]Bug 14544) - * alloca() used in wsutil/getopt_long.c without <alloca.h> inclusion. - ([29]Bug 14552) - * HP-UX HP ANSI C requires -Wp,-H200000 flag to compile. ([30]Bug - 14554) - * Makefile.in uses non-portable "install" command. ([31]Bug 14555) - * HP-UX HP ANSI C doesn't support assigning {} to a variable in - epan/app_mem_usage.c. ([32]Bug 14556) - * PPP in SSTP, HDLC framing not parsed properly. ([33]Bug 14559) - * Using the DIAMETER dictionary causes the standard input to be - closed when the dictionary is read. ([34]Bug 14577) + * SMB2 Write requests not displayed. ([13]Bug 14598) + * Wrong default file format chosen in when saving a capture with + comments added if the original format doesn't support comments. + ([14]Bug 14601) + * WinSparkle 0.5.6 is out of date and is buggy. ([15]Bug 14642) New and Updated Features @@ -80,14 +46,12 @@ What's New Updated Protocol Support - 6LoWPAN, ADB, DNS, Ethernet, GIOP, GSM BSSMAP, H.223, IEEE 802.11, IEEE - 802.11 Radiotap, IEEE 802.15.4, ISUP, Kerberos, LAPD, LWAPP, MIME - multipart, MP4, NBAP, PCP, PEEKREMOTE, S1AP, SMB2, SSTP, T.30, TN3270, - VLAN, WCCP, and WSP + BATADV, BSSMAP, BVLC, DNS, GSM A DTAP, GTP, IEEE 802.11, LDSS, Logcat + Text, MP2T, MPEG PES, NBSS, Q.931, and S7COMM New and Updated Capture File Support - There is no new or updated capture file support in this release. + 3GPP TS 32.423 Trace, and Android Logcat New and Updated Capture Interfaces support @@ -102,14 +66,14 @@ What's New Getting Wireshark Wireshark source code and installation packages are available from - [35]https://www.wireshark.org/download.html. + [16]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be - found on the [36]download page on the Wireshark web site. + found on the [17]download page on the Wireshark web site. __________________________________________________________________ File Locations @@ -122,88 +86,69 @@ File Locations Known Problems - Dumpcap might not quit if Wireshark or TShark crashes. ([37]Bug 1419) + Dumpcap might not quit if Wireshark or TShark crashes. ([18]Bug 1419) - The BER dissector might infinitely loop. ([38]Bug 1516) + The BER dissector might infinitely loop. ([19]Bug 1516) Capture filters aren't applied when capturing from named pipes. - ([39]Bug 1814) + ([20]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. - ([40]Bug 2234) + ([21]Bug 2234) - Application crash when changing real-time option. ([41]Bug 4035) + Application crash when changing real-time option. ([22]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. - ([42]Bug 4985) + ([23]Bug 4985) - Wireshark should let you work with multiple capture files. ([43]Bug + Wireshark should let you work with multiple capture files. ([24]Bug 10488) __________________________________________________________________ Getting Help - Community support is available on [44]Wireshark's Q&A site and on the + Community support is available on [25]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for - all of Wireshark's mailing lists can be found on [45]the web site. + all of Wireshark's mailing lists can be found on [26]the web site. Official Wireshark training and certification are available from - [46]Wireshark University. + [27]Wireshark University. __________________________________________________________________ Frequently Asked Questions - A complete FAQ is available on the [47]Wireshark web site. + A complete FAQ is available on the [28]Wireshark web site. __________________________________________________________________ - Last updated 2018-04-03 18:38:19 UTC + Last updated 2018-05-21 20:14:12 UTC References - 1. https://www.wireshark.org/security/wnpa-sec-2018-15.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 - 3. https://www.wireshark.org/security/wnpa-sec-2018-16.html - 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460 - 5. https://www.wireshark.org/security/wnpa-sec-2018-17.html - 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468 - 7. https://www.wireshark.org/security/wnpa-sec-2018-18.html - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471 - 9. https://www.wireshark.org/security/wnpa-sec-2018-19.html - 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469 - 11. https://www.wireshark.org/security/wnpa-sec-2018-20.html - 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467 - 13. https://www.wireshark.org/security/wnpa-sec-2018-23.html - 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576 - 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480 - 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481 - 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482 - 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483 - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484 - 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14293 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14452 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14528 - 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14538 - 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14544 - 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14552 - 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14554 - 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14555 - 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14556 - 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14559 - 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14577 - 35. https://www.wireshark.org/download.html - 36. https://www.wireshark.org/download.html#thirdparty - 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 - 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 - 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 - 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 - 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 - 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 - 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 - 44. https://ask.wireshark.org/ - 45. https://www.wireshark.org/lists/ - 46. http://www.wiresharktraining.com/ - 47. https://www.wireshark.org/faq.html + 1. https://www.wireshark.org/security/wnpa-sec-2018-25.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615 + 3. https://www.wireshark.org/security/wnpa-sec-2018-28.html + 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678 + 5. https://www.wireshark.org/security/wnpa-sec-2018-29.html + 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681 + 7. https://www.wireshark.org/security/wnpa-sec-2018-30.html + 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688 + 9. https://www.wireshark.org/security/wnpa-sec-2018-31.html + 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689 + 11. https://www.wireshark.org/security/wnpa-sec-2018-33.html + 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703 + 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14598 + 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14601 + 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642 + 16. https://www.wireshark.org/download.html + 17. https://www.wireshark.org/download.html#thirdparty + 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 + 25. https://ask.wireshark.org/ + 26. https://www.wireshark.org/lists/ + 27. http://www.wiresharktraining.com/ + 28. https://www.wireshark.org/faq.html diff --git a/version.conf b/version.conf index 6dedd7c96a..9480b2f829 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add a "rc" to the version. -enable: 1 -pkg_format: rc0-%# -pkg_enable: 1 +#enable: 1 +#pkg_format: rc0-%# +#pkg_enable: 1 # Final release: Disable package version stamps. -#enable: 1 -#pkg_format: -#pkg_enable: 0 +enable: 1 +pkg_format: +pkg_enable: 0 |