aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGerald Combs <gerald@wireshark.org>2015-05-12 10:15:51 -0700
committerGerald Combs <gerald@wireshark.org>2015-05-12 20:16:01 +0000
commit5819e5b13c0bbd224fde5a4c900ad8e22f09b4cc (patch)
treecc9ef49d611b6734cca10e720d89428aa2132af1
parent769dd52cde690f4b2562ed05cbc300135679015c (diff)
downloadwireshark-1.12.5.tar.gz
wireshark-1.12.5.tar.bz2
wireshark-1.12.5.zip
Change-Id: I7c81dcbb3f5de9af56e6c6170ea1d3fa5c013245 Reviewed-on: https://code.wireshark.org/review/8436 Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r--ChangeLog341
-rw-r--r--NEWS229
-rw-r--r--docbook/release-notes.asciidoc28
-rw-r--r--version.conf12
4 files changed, 479 insertions, 131 deletions
diff --git a/ChangeLog b/ChangeLog
index 491f0c9c8a..13ee92b1f2 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,344 @@
+commit 106b226
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue May 12 10:15:51 2015 -0700
+
+ Build 1.12.5.
+
+ Change-Id: I7c81dcbb3f5de9af56e6c6170ea1d3fa5c013245
+
+commit 769dd52
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue May 12 12:49:06 2015 -0700
+
+ Don't assume file_read() won't itself return WTAP_ERR_SHORT_READ.
+
+ There are some paths where it will.
+
+ Change-Id: Ic086fc8160a69b433f8acafd4e387cf9a0c8b38c
+ Reviewed-on: https://code.wireshark.org/review/8434
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 986a41a
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue May 12 10:32:29 2015 -0700
+
+ Backport some parts of Ia5dba2a6f81151e87b614461349d611cffc16210.
+
+ This should make sure logcat_open() doesn't report an error for a file
+ that's not a logcat file, preventing other heuristic open routines from
+ checking the file.
+
+ Change-Id: I4c042459550f6d27f40a76f103d95a7f4e317969
+ Reviewed-on: https://code.wireshark.org/review/8432
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 299e206
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue May 12 10:06:15 2015 -0700
+
+ Backport some parts of I5573c6bdca856a304877d9bef643f8c0fa93cdaf.
+
+ Backport the parts of
+
+ commit 56a09d24dcdcaddae1cb67a18bbc2fd588c427ed
+ Author: Michal Labedzki <michal.labedzki@tieto.com>
+ Date: Wed Jul 23 12:26:05 2014 +0200
+
+ Try to fix some buildbot warnings
+
+ Most interesting are:
+ warning: cannot optimize loop, the loop counter may overflow [-Wunsafe-loop-optimizations]
+ warning: ISO C forbids zero-size array [-Wpedantic]
+ warning: ISO C90 doesn't support unnamed structs/unions [-Wpedantic]
+ warning: cast discards '__attribute__((const))' qualifier from pointer target type [-Wcast-qual
+ warning: initializer element is not computable at load time [enabled by default]
+
+ Change-Id: I5573c6bdca856a304877d9bef643f8c0fa93cdaf
+ Reviewed-on: https://code.wireshark.org/review/3174
+ Petri-Dish: Michal Labedzki <michal.labedzki@tieto.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com>
+
+ relevant to this version of wiretap/logcat.c. They fix "ISO C forbids
+ zero-size array"; not all compilers we support allow zero-size arrays.
+
+ They also make the code a bit more like the version on the trunk.
+
+ Change-Id: I6524a8c05c1d945312ec1db7c305422f1021ef2c
+ Reviewed-on: https://code.wireshark.org/review/8431
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 09eda88
+Author: Michal Labedzki <michal.labedzki@tieto.com>
+Date: Mon Sep 22 10:25:32 2014 +0200
+
+ Reduce compilator warnings
+
+ warning: cast from 'const guint8 *' (aka 'const unsigned char *') to
+ 'const guint16 *' (aka 'const unsigned short *') increases required
+ alignment from 1 to 2 [-Wcast-align]
+ warning: cast from 'const guint8 *' (aka 'const unsigned char *') to
+ 'const struct logger_entry *' increases required alignment
+ from 1 to 4 [-Wcast-align]
+
+ Change-Id: Ia7091c75353092680f7108da88d1cc647dd15050
+ Reviewed-on: https://code.wireshark.org/review/8429
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 3d8f9d4
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Tue Jul 15 08:41:57 2014 +0200
+
+ Fix Dead Store (Dead assignement/Dead increment) warning found by Clang
+
+ Reviewed-on: https://code.wireshark.org/review/3052
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ (cherry picked from commit ef1b11f622ce61bc363e13ec6b80afaae9642441)
+
+ Change-Id: If3d37f7485965485eb75e5fbbe7a35899c004bb8
+ Reviewed-on: https://code.wireshark.org/review/8349
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 560b90b
+Author: Graham Bloice <graham.bloice@trihedral.com>
+Date: Fri Jul 11 22:30:25 2014 +0100
+
+ Fix the x64 builds after the commit:b3b1f7c3aa2233a147294bad833b748d38fba84d
+ From Change: 2803
+
+ Reviewed-on: https://code.wireshark.org/review/3014
+ Reviewed-by: Graham Bloice <graham.bloice@trihedral.com>
+ (cherry picked from commit 804409747357071631867ccbabc16a5575f5f364)
+
+ Change-Id: Ib8bad631f2544f5ffc1aa50b274223ef4d6876d3
+ Reviewed-on: https://code.wireshark.org/review/8348
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 87fed6b
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Jul 11 14:01:26 2014 -0700
+
+ Add strlen casts.
+
+ Reviewed-on: https://code.wireshark.org/review/3012
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit e2038e03007faaa29f9ed1cb3619e84bd6e03247)
+
+ Change-Id: Ifad67f7d0943b53b007425cb9110623d000776d9
+ Reviewed-on: https://code.wireshark.org/review/8347
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit afeff4f
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Jul 3 11:23:19 2014 +0200
+
+ logcat: improve (crash) robustness, improve names
+
+ The logcat version detector would crash with ASAN enabled because it did
+ not validate the payload length and hence a payload length of 0 would
+ trigger out-of-bounds access. (This happened on non-logcat data.)
+
+ This patch tries to get rid of all magic numbers by using a structure,
+ improves the version detector to validate the payload length and
+ prevents crashes due to missing nul-terminators in the input. Older
+ Android kernels would create entries with __pad with random contents, so
+ that cannot be used to determine version for v1. Instead, use heuristics
+ on the priority, tag and maybe the msg field.
+
+ Furthermore, Android is mostly (if not, always?) Little-Endian, so add
+ conversions where necessary (just in case WS supports BE arches).
+
+ "microseconds" has been renamed to "milliseconds" because that is what
+ they are, actually. A duplicate logcat_log loop has been refactored
+ such that one loop is sufficient, instead of separate buffers for each
+ log part, a single one is now used. get_priority does not really need
+ a pointer, just make it accept a character.
+
+ The output has been validated against v1 and v2 logcat binary formats
+ with __pad (hdr_size) equal to 0, and on attachment 9906.
+
+ Reviewed-on: https://code.wireshark.org/review/2803
+ Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com>
+ Tested-by: Michal Labedzki <michal.labedzki@tieto.com>
+ (cherry picked from commit b3b1f7c3aa2233a147294bad833b748d38fba84d)
+
+ Conflicts:
+ wiretap/logcat.c
+
+ Change-Id: I33bb20b5f9a5e03a231121a784bfffdfba0aba98
+ Reviewed-on: https://code.wireshark.org/review/8346
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ab74ebd
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Mon May 11 15:45:04 2015 -0400
+
+ Fix Diameter reassembly when the captured tvb length is less than 5 bytes.
+
+ Since Diameter does heuristic checks before calling tcp_dissect_pdus() we
+ have to "manually" ask for more data if the tvb is too short for our
+ heuristics.
+
+ Bug: 11183
+ Change-Id: I14c36042306b532b53df80cc3971866b76094084
+ Reviewed-on: https://code.wireshark.org/review/8405
+ Reviewed-by: Evan Huus <eapache@gmail.com>
+ Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ (cherry picked from commit d1f78230c9dcc631659f3e5f0008bf01115c2d69)
+ Conflicts:
+ epan/dissectors/packet-diameter.c
+ Reviewed-on: https://code.wireshark.org/review/8428
+
+commit 8b7f2c9
+Author: Jeff Morriss <morriss@ulticom.com>
+Date: Tue May 12 09:29:38 2015 -0400
+
+ Mark an unused parameter as unused.
+
+ Change-Id: I83e50f7b4ebbaf99d7341a5c481c7e411a5f2773
+ Reviewed-on: https://code.wireshark.org/review/8426
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+
+commit 34f5fa5
+Author: Michal Labedzki <michal.labedzki@tieto.com>
+Date: Mon Jun 9 16:07:22 2014 +0200
+
+ Logcat: Fix dump formats
+
+ Some dump formats are not exactly what should be done,
+ so fix them and try to little improve them (mostly by space padding %-8s)
+
+ Reviewed-on: https://code.wireshark.org/review/2550
+ Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com>
+ (cherry picked from commit 4a3d0b868473260c24aa66f5e3fa737b54a9fd02)
+
+ Change-Id: Id3bc0515fac932594dd8a6759519d3d0182f9252
+ Reviewed-on: https://code.wireshark.org/review/8345
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 04e948d
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon May 11 19:40:59 2015 -0700
+
+ In the name of God and all that is holy, don't do that.
+
+ http://www.bitterfilms.com/rejected.html
+
+ 1) There is *NO* guarantee that you can safely dereference a misaligned
+ pointer.
+
+ 2) There is *NO* guarantee that you are running on a little-endian
+ machine, so that an attempt to fetch a 32-bit integer through such a
+ pointer will fetch it in little-endian form.
+
+ Instead, fetch it using tvb_get_letohl(), which 1) doesn't care about
+ alignment and 2) always fetches in little-endian order.
+
+ Change-Id: I44721cbf3c4456797990cc741836c9dd8c6c3696
+ Reviewed-on: https://code.wireshark.org/review/8423
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 2693e1d1081ac8a5f3cf15b5961d0229775e25e6)
+ Reviewed-on: https://code.wireshark.org/review/8424
+
+commit d989452
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon May 11 15:10:54 2015 -0700
+
+ Do not assume the data field of an address structure is an aligned pointer.
+
+ There is *no* guarantee that it's aligned on a 4-byte boundary, and
+ there is *no* guarantee that you can safely dereference an unaligned
+ pointer. See bug 11172 for a crash on Solaris/SPARC caused by those
+ assumptions both being false.
+
+ Change-Id: I001a71bf060f00c48ae5c586dea6cc3463d49d9a
+ Reviewed-on: https://code.wireshark.org/review/8415
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit e8469d3
+Author: Michael Mann <mmann78@netscape.net>
+Date: Sun May 10 12:53:10 2015 -0400
+
+ MEGACO - remember "short form" format and don't recheck it.
+
+ Bug: 10909
+ Change-Id: I21eb0f520029fd8f84e6bef63dddeddd9df2f799
+ Reviewed-on: https://code.wireshark.org/review/8383
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 43c69c8
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun May 10 08:11:28 2015 -0700
+
+ [Automatic update for 2015-05-10]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: I6f824423e7cfc632daca42ade029fde9faf32fd5
+ Reviewed-on: https://code.wireshark.org/review/8377
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 8c4ee42
+Author: Jamil Nimeh <jnimeh@gmail.com>
+Date: Fri May 8 20:28:20 2015 +0200
+
+ SSL: fix dissection of CertificateStatus message with OCSP_MULTI
+
+ Bug: 11181
+ Change-Id: I05769e254f2e276e1594d7ed5cb50496e16cfc2f
+ Reviewed-on: https://code.wireshark.org/review/8356
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 6cf626e3ad1ded1fc36c7d7fa8054d0aeb2ecde1)
+ Reviewed-on: https://code.wireshark.org/review/8366
+
+commit 4e04dea
+Author: Jiří Engelthaler <engycz@gmail.com>
+Date: Wed May 6 17:34:54 2015 +0200
+
+ packet-iec104: make object number filterable if SQ flag is set
+
+ Make object number filterable again if SQ flag is set which breaks my commit 785fab7f
+ Sample capture https://wiki.wireshark.org/SampleCaptures?action=AttachFile&do=get&target=IEC104_SQ.pcapng
+
+ Change-Id: I450b86452876fab26e1a9f1bfc2f729573c52124
+ Reviewed-on: https://code.wireshark.org/review/8313
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit d8ccd27181e37c9846ec8ac6ffd4eccb33840016)
+ Reviewed-on: https://code.wireshark.org/review/8326
+
+commit 187bdef
+Author: Michael Mann <mmann78@netscape.net>
+Date: Tue May 5 07:54:25 2015 -0400
+
+ Set tap filter when WLAN "Limit to display filter" option is checked.
+
+ Bug: 11160
+ Change-Id: Ic2f1475a3b51eb8919435f1064fc0faf3c4da3eb
+ Reviewed-on: https://code.wireshark.org/review/8296
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 050de6aa2ff73e3c4ac8041703ffd8437912ab1f)
+ Reviewed-on: https://code.wireshark.org/review/8315
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit cb15a7b
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue May 5 15:52:26 2015 -0700
+
+ Prep for 1.12.5.
+
+ Change-Id: I19bdd3ed5204337af16916870aa9abc43cf2bcd4
+ Reviewed-on: https://code.wireshark.org/review/8305
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
commit 1f02f2d
Author: Gerald Combs <gerald@wireshark.org>
Date: Tue May 5 13:52:13 2015 -0700
diff --git a/NEWS b/NEWS
index 330cdc709c..0d49afd044 100644
--- a/NEWS
+++ b/NEWS
@@ -1,4 +1,4 @@
- Wireshark 1.12.4 Release Notes
+ Wireshark 1.12.5 Release Notes
__________________________________________________________________
What is Wireshark?
@@ -12,70 +12,67 @@ What's New
Bug Fixes
The following vulnerabilities have been fixed.
- * [1]wnpa-sec-2015-06
- The ATN-CPDLC dissector could crash. ([2]Bug 9952) [3]CVE-2015-2187
- * [4]wnpa-sec-2015-07
- The WCP dissector could crash. ([5]Bug 10844) [6]CVE-2015-2188
- * [7]wnpa-sec-2015-08
- The pcapng file parser could crash. ([8]Bug 10895) [9]CVE-2015-2189
- * [10]wnpa-sec-2015-09
- The LLDP dissector could crash. ([11]Bug 10983) [12]CVE-2015-2190
- * [13]wnpa-sec-2015-10
- The TNEF dissector could go into an infinite loop. Discovered by
- Vlad Tsyrklevich. ([14]Bug 11023) [15]CVE-2015-2191
- * [16]wnpa-sec-2015-11
- The SCSI OSD dissector could go into an infinite loop. Discovered
- by Vlad Tsyrklevich. ([17]Bug 11024) [18]CVE-2015-2192
+ * [1]wnpa-sec-2015-12
+ The LBMR dissector could go into an infinite loop. ([2]Bug 11036)
+ [3]CVE-2015-3808 [4]CVE-2015-3809
+ * [5]wnpa-sec-2015-13
+ The WebSocket dissector could recurse excessively. ([6]Bug 10989)
+ [7]CVE-2015-3810
+ * [8]wnpa-sec-2015-14
+ The WCP dissector could crash while decompressing data. ([9]Bug
+ 10978) [10]CVE-2015-3811
+ * [11]wnpa-sec-2015-15
+ The X11 dissector could leak memory. ([12]Bug 11088)
+ [13]CVE-2015-3812
+ * [14]wnpa-sec-2015-16
+ The packet reassembly code could leak memory. ([15]Bug 11129)
+ [16]CVE-2015-3813
+ * [17]wnpa-sec-2015-17
+ The IEEE 802.11 dissector could go into an infinite loop. ([18]Bug
+ 11110) [19]CVE-2015-3814
+ * [20]wnpa-sec-2015-18
+ The Android Logcat file parser could crash. Discovered by Hanno
+ Böck. ([21]Bug 11188) [22]CVE-2015-3815
The following bugs have been fixed:
- * RTP player crashes on decode of long call: BadAlloc (insufficient
- resources for operation). ([19]Bug 2630)
- * "Telephony->SCTP->Analyse This Association" crashes Wireshark on
- manufactured SCTP packet. ([20]Bug 9849)
- * IPv6 Mobility Header Link Layer Address is parsed incorrectly.
- ([21]Bug 10006)
- * DNS NXT RR is parsed incorrectly. ([22]Bug 10615)
- * IPv6 AUTH mobility option parses Mobility SPI and Authentication
- Data incorrectly. ([23]Bug 10626)
- * IPv6 Mobility Header Link-Layer Address Mobility Option is parsed
- incorrectly. ([24]Bug 10627)
- * HTTP chunked response includes data beyond the chunked response.
- ([25]Bug 10707)
- * DHCP Option 125 Suboption: (1) option-len always expects 1 but
- specification allows for more. ([26]Bug 10784)
- * Incorrect decoding of IPv4 Interface/Neighbor Address sub-TLVs in
- Extended IS Reachability TLV of IS-IS. ([27]Bug 10837)
- * Little-endian OS X Bluetooth PacketLogger files aren't handled.
- ([28]Bug 10861)
- * X.509 certificate serial number incorrectly interpreted as negative
- number. ([29]Bug 10862)
- * Malformed Packet on rsync-version with length 2. ([30]Bug 10863)
- * ZigBee epoch time is incorrectly displayed in OTA cluster. ([31]Bug
- 10872)
- * BGP EVPN - Route Type 4 - "Invalid length of IP Address" - "Expert
- Info" shows a false error. ([32]Bug 10873)
- * Bad bytes read for extended rnc id value in GTP dissector. ([33]Bug
- 10877)
- * "ServiceChangeReasonStr" messages are not shown in txt generated by
- tshark. ([34]Bug 10879)
- * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI.
- ([35]Bug 10897)
- * MEGACO wrong decoding on media port. ([36]Bug 10898)
- * Wrong media format. ([37]Bug 10899)
- * BSSGP Status PDU decoding fault (missing Mandatory element (0x04)
- BVCI for proper packet). ([38]Bug 10903)
- * DNS LOC Precision missing units. ([39]Bug 10940)
- * Packets on OpenBSD loopback decoded as raw not null. ([40]Bug
- 10956)
- * Display Filter Macro unable to edit. ([41]Bug 10957)
- * IPv6 Local Mobility Anchor Address mobility option code is treated
- incorrectly. ([42]Bug 10961)
- * SNTP server list improperly formatted in DHCPv6 packet details.
- ([43]Bug 10964)
- * Juniper Packet Mirror dissector expects ipv6 flow label = 0.
- ([44]Bug 10976)
- * NS Trace (NetScaler Trace) file format is not able to export
- specified packets. ([45]Bug 10998)
+ * Wireshark crashes if "Update list of packets in real time" is
+ disabled and a display filter is applied while capturing. ([23]Bug
+ 6217)
+ * EAPOL 4-way handshake information wrong. ([24]Bug 10557)
+ * RPC NULL calls incorrectly flagged as malformed. ([25]Bug 10646)
+ * Wireshark relative ISN set incorrectly if raw ISN set to 0.
+ ([26]Bug 10713)
+ * Buffer overrun in encryption code. ([27]Bug 10849)
+ * Crash when use Telephony / Voip calls. ([28]Bug 10885)
+ * ICMP Parameter Problem message contains Length of original datagram
+ is treated as the total IPv4 length. ([29]Bug 10991)
+ * ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. ([30]Bug
+ 10992)
+ * Missing field "tcp.pdu.size" in TCP stack. ([31]Bug 11007)
+ * Sierra EM7345 marks MBIM packets as NCM. ([32]Bug 11018)
+ * Possible infinite loop DoS in ForCES dissector. ([33]Bug 11037)
+ * "Decode As..." crashes when a packet dialog is open. ([34]Bug
+ 11043)
+ * Interface Identifier incorrectly represented by Wireshark. ([35]Bug
+ 11053)
+ * "Follow UDP Stream" on mpeg packets crashes wireshark v.1.12.4
+ (works fine on v.1.10.13). ([36]Bug 11055)
+ * Annoying popup when trying to capture on bonds. ([37]Bug 11058)
+ * Request-response cross-reference in USB URB packets incorrect.
+ ([38]Bug 11072)
+ * Right clicking in Expert Infos to create a filter (duplicate IP)
+ results in invalid filters. ([39]Bug 11073)
+ * CanOpen dissector fails on frames with RTR and 0 length. ([40]Bug
+ 11083)
+ * Typo in secp521r1 curve wrongly identified as sect521r1. ([41]Bug
+ 11106)
+ * packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn't filter ENUM. ([42]Bug
+ 11120)
+ * Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP".
+ ([43]Bug 11141)
+ * Missing Makefile.nmake in ansi1/Kerberos directory. ([44]Bug 11155)
+ * Can't build tshark without the Qt packages installed unless
+ --without-qt is specified. ([45]Bug 11157)
New and Updated Features
@@ -87,18 +84,14 @@ What's New
Updated Protocol Support
- ACN, ANSI IS-637-A, AppleMIDI, ATN-CPDLC, BGP, BSSGP, CMIP, DHCP,
- DHCPv6, DIS, DLM3, DMP, DNS, Extreme Networks, ForCES, FTAM, GMHDR, GSM
- A BSSMAP, GSM A-bis OML, GSM MAP, GSM RLC MAC, GTP, H.248, H.264, HTTP,
- IEEE 802.11, IPv6, IS-IS, ISMACryp, J1939, Juniper Jmirror, KDP, L2CAP,
- LDAP, LLDP, MGCP, MIP6, NBNS, NET/ROM, Netflow, Novell PKIS, PANA,
- PPPoE, RSL, RSYNC, RTMPT, RTP, SCSI OSD, SDP, SMB Pipe, SMPP,
- SYNCHROPHASOR, TETRA, TiVoConnect, TNEF, USB HID, V.52, VSS-Monitoring,
- X.509AF, Zebra, and ZigBee
+ AllJoyn, ASN.1 PER, ATM, CANopen, Diameter, ForCES, GSM RLC/MAC,
+ GSMTAP, ICMP, IEC-60870-5-104, IEEE 802.11, IMF, IP, LBMC, LBMR, LDAP,
+ LPP, MBIM, MEGACO, MP2T, PKCS-1, PPP IPv6CP, RPC, SPNEGO, SRVLOC, SSL,
+ T.38, TCP, USB, WCP, WebSocket, X11, and ZigBee ZCL
New and Updated Capture File Support
- NetScaler, PacketLogger, and Pcapng
+ and Android Logcat Savvius OmniPeek Visual Networks
__________________________________________________________________
Getting Wireshark
@@ -165,55 +158,55 @@ Frequently Asked Questions
A complete FAQ is available on the [62]Wireshark web site.
__________________________________________________________________
- Last updated 2015-03-04 08:53:00 PST
+ Last updated 2015-05-12 13:03:24 PDT
References
- 1. https://www.wireshark.org/security/wnpa-sec-2015-06.html
- 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
- 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187
- 4. https://www.wireshark.org/security/wnpa-sec-2015-07.html
- 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
- 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188
- 7. https://www.wireshark.org/security/wnpa-sec-2015-08.html
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
- 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189
- 10. https://www.wireshark.org/security/wnpa-sec-2015-09.html
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
- 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190
- 13. https://www.wireshark.org/security/wnpa-sec-2015-10.html
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
- 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191
- 16. https://www.wireshark.org/security/wnpa-sec-2015-11.html
- 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
- 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192
- 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2630
- 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9849
- 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10006
- 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10615
- 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10626
- 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627
- 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10707
- 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10784
- 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10837
- 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10861
- 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10862
- 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10863
- 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10872
- 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10873
- 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10877
- 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10879
- 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10897
- 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10898
- 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10899
- 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10903
- 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10940
- 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10956
- 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10957
- 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10961
- 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10964
- 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10976
- 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10998
+ 1. https://www.wireshark.org/security/wnpa-sec-2015-12.html
+ 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
+ 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808
+ 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809
+ 5. https://www.wireshark.org/security/wnpa-sec-2015-13.html
+ 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
+ 7. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810
+ 8. https://www.wireshark.org/security/wnpa-sec-2015-14.html
+ 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
+ 10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811
+ 11. https://www.wireshark.org/security/wnpa-sec-2015-15.html
+ 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
+ 13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812
+ 14. https://www.wireshark.org/security/wnpa-sec-2015-16.html
+ 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
+ 16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813
+ 17. https://www.wireshark.org/security/wnpa-sec-2015-17.html
+ 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
+ 19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814
+ 20. https://www.wireshark.org/security/wnpa-sec-2015-18.html
+ 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
+ 22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6217
+ 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10557
+ 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10646
+ 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10713
+ 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10849
+ 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10885
+ 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10991
+ 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10992
+ 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11007
+ 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11018
+ 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11037
+ 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11043
+ 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11053
+ 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11055
+ 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11058
+ 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11072
+ 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11073
+ 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11083
+ 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11106
+ 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11120
+ 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11141
+ 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11155
+ 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11157
46. http://www.wireshark.org/download.html
47. http://www.wireshark.org/download.html#thirdparty
48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc
index a6deab3b91..8b7091779e 100644
--- a/docbook/release-notes.asciidoc
+++ b/docbook/release-notes.asciidoc
@@ -20,7 +20,8 @@ The LBMR dissector could go into an infinite loop.
// Fixed in master-1.12: g524d585
// Fixed in master-1.10: N/A
(ws-buglink:11036[])
-//cve-idlink:2015-XXXX[]
+cve-idlink:2015-3808[]
+cve-idlink:2015-3809[]
* ws-salink:2015-13[]
+
@@ -29,7 +30,7 @@ The WebSocket dissector could recurse excessively.
// Fixed in master-1.12: gcdb1fc6
// Fixed in master-1.10: Unknown
(ws-buglink:10989[])
-//cve-idlink:2015-XXXX[]
+cve-idlink:2015-3810[]
* ws-salink:2015-14[]
+
@@ -38,7 +39,7 @@ The WCP dissector could crash while decompressing data.
// Fixed in master-1.12: g65db378
// Fixed in master-1.10: ge5a9cf3
(ws-buglink:10978[])
-//cve-idlink:2015-XXXX[]
+cve-idlink:2015-3811[]
* ws-salink:2015-15[]
+
@@ -47,7 +48,7 @@ The X11 dissector could leak memory.
// Fixed in master-1.12: g7b58f02
// Fixed in master-1.10: g7cb179e
(ws-buglink:11088[])
-//cve-idlink:2015-XXXX[]
+cve-idlink:2015-3812[]
* ws-salink:2015-16[]
+
@@ -56,7 +57,7 @@ The packet reassembly code could leak memory.
// Fixed in master-1.12: g5bbf0d2
// Fixed in master-1.10: Unknown
(ws-buglink:11129[])
-//cve-idlink:2015-XXXX[]
+cve-idlink:2015-3813[]
* ws-salink:2015-17[]
+
@@ -65,7 +66,16 @@ The IEEE 802.11 dissector could go into an infinite loop.
// Fixed in master-1.12: gc3bee61
// Fixed in master-1.10: gcd4dd9a
(ws-buglink:11110[])
-//cve-idlink:2015-XXXX[]
+cve-idlink:2015-3814[]
+
+* ws-salink:2015-18[]
++
+The Android Logcat file parser could crash. Discovered by Hanno Böck.
+// Fixed in master: gb3b1f7c, ge2038e0, g8044097, ef1b11f
+// Fixed in master-1.12: g489680c, g87fed6b, g560b90b, g3d8f9d4, g09eda88, g299e206
+// Fixed in master-1.10: N/A
+(ws-buglink:11188[])
+cve-idlink:2015-3815[]
The following bugs have been fixed:
@@ -136,6 +146,7 @@ AllJoyn
ATM
ASN.1 PER
CANopen
+Diameter
ForCES
GSM RLC/MAC
GSMTAP
@@ -144,16 +155,19 @@ IEC-60870-5-104
IEEE 802.11
IMF
IP
+LBMC
LBMR
LDAP
LPP
MBIM
+MEGACO
MP2T
PKCS-1
PPP IPv6CP
RPC
SPNEGO
SRVLOC
+SSL
T.38
TCP
USB
@@ -166,7 +180,7 @@ ZigBee ZCL
=== New and Updated Capture File Support
--sort-and-group--
-Savvius OmniPeek, Visual Networks
+Android Logcat, Savvius OmniPeek, Visual Networks
--sort-and-group--
== Getting Wireshark
diff --git a/version.conf b/version.conf
index 6dedd7c96a..9480b2f829 100644
--- a/version.conf
+++ b/version.conf
@@ -1,9 +1,9 @@
# Interim releases: Enable packaging, add a "rc" to the version.
-enable: 1
-pkg_format: rc0-%#
-pkg_enable: 1
+#enable: 1
+#pkg_format: rc0-%#
+#pkg_enable: 1
# Final release: Disable package version stamps.
-#enable: 1
-#pkg_format:
-#pkg_enable: 0
+enable: 1
+pkg_format:
+pkg_enable: 0