diff options
author | Gerald Combs <gerald@wireshark.org> | 2015-05-12 10:15:51 -0700 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2015-05-12 20:16:01 +0000 |
commit | 5819e5b13c0bbd224fde5a4c900ad8e22f09b4cc (patch) | |
tree | cc9ef49d611b6734cca10e720d89428aa2132af1 | |
parent | 769dd52cde690f4b2562ed05cbc300135679015c (diff) | |
download | wireshark-1.12.5.tar.gz wireshark-1.12.5.tar.bz2 wireshark-1.12.5.zip |
Build 1.12.5.wireshark-1.12.5v1.12.5
Change-Id: I7c81dcbb3f5de9af56e6c6170ea1d3fa5c013245
Reviewed-on: https://code.wireshark.org/review/8436
Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r-- | ChangeLog | 341 | ||||
-rw-r--r-- | NEWS | 229 | ||||
-rw-r--r-- | docbook/release-notes.asciidoc | 28 | ||||
-rw-r--r-- | version.conf | 12 |
4 files changed, 479 insertions, 131 deletions
@@ -1,3 +1,344 @@ +commit 106b226 +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue May 12 10:15:51 2015 -0700 + + Build 1.12.5. + + Change-Id: I7c81dcbb3f5de9af56e6c6170ea1d3fa5c013245 + +commit 769dd52 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue May 12 12:49:06 2015 -0700 + + Don't assume file_read() won't itself return WTAP_ERR_SHORT_READ. + + There are some paths where it will. + + Change-Id: Ic086fc8160a69b433f8acafd4e387cf9a0c8b38c + Reviewed-on: https://code.wireshark.org/review/8434 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 986a41a +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue May 12 10:32:29 2015 -0700 + + Backport some parts of Ia5dba2a6f81151e87b614461349d611cffc16210. + + This should make sure logcat_open() doesn't report an error for a file + that's not a logcat file, preventing other heuristic open routines from + checking the file. + + Change-Id: I4c042459550f6d27f40a76f103d95a7f4e317969 + Reviewed-on: https://code.wireshark.org/review/8432 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 299e206 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue May 12 10:06:15 2015 -0700 + + Backport some parts of I5573c6bdca856a304877d9bef643f8c0fa93cdaf. + + Backport the parts of + + commit 56a09d24dcdcaddae1cb67a18bbc2fd588c427ed + Author: Michal Labedzki <michal.labedzki@tieto.com> + Date: Wed Jul 23 12:26:05 2014 +0200 + + Try to fix some buildbot warnings + + Most interesting are: + warning: cannot optimize loop, the loop counter may overflow [-Wunsafe-loop-optimizations] + warning: ISO C forbids zero-size array [-Wpedantic] + warning: ISO C90 doesn't support unnamed structs/unions [-Wpedantic] + warning: cast discards '__attribute__((const))' qualifier from pointer target type [-Wcast-qual + warning: initializer element is not computable at load time [enabled by default] + + Change-Id: I5573c6bdca856a304877d9bef643f8c0fa93cdaf + Reviewed-on: https://code.wireshark.org/review/3174 + Petri-Dish: Michal Labedzki <michal.labedzki@tieto.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com> + + relevant to this version of wiretap/logcat.c. They fix "ISO C forbids + zero-size array"; not all compilers we support allow zero-size arrays. + + They also make the code a bit more like the version on the trunk. + + Change-Id: I6524a8c05c1d945312ec1db7c305422f1021ef2c + Reviewed-on: https://code.wireshark.org/review/8431 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 09eda88 +Author: Michal Labedzki <michal.labedzki@tieto.com> +Date: Mon Sep 22 10:25:32 2014 +0200 + + Reduce compilator warnings + + warning: cast from 'const guint8 *' (aka 'const unsigned char *') to + 'const guint16 *' (aka 'const unsigned short *') increases required + alignment from 1 to 2 [-Wcast-align] + warning: cast from 'const guint8 *' (aka 'const unsigned char *') to + 'const struct logger_entry *' increases required alignment + from 1 to 4 [-Wcast-align] + + Change-Id: Ia7091c75353092680f7108da88d1cc647dd15050 + Reviewed-on: https://code.wireshark.org/review/8429 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 3d8f9d4 +Author: Alexis La Goutte <alexis.lagoutte@gmail.com> +Date: Tue Jul 15 08:41:57 2014 +0200 + + Fix Dead Store (Dead assignement/Dead increment) warning found by Clang + + Reviewed-on: https://code.wireshark.org/review/3052 + Reviewed-by: Evan Huus <eapache@gmail.com> + (cherry picked from commit ef1b11f622ce61bc363e13ec6b80afaae9642441) + + Change-Id: If3d37f7485965485eb75e5fbbe7a35899c004bb8 + Reviewed-on: https://code.wireshark.org/review/8349 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 560b90b +Author: Graham Bloice <graham.bloice@trihedral.com> +Date: Fri Jul 11 22:30:25 2014 +0100 + + Fix the x64 builds after the commit:b3b1f7c3aa2233a147294bad833b748d38fba84d + From Change: 2803 + + Reviewed-on: https://code.wireshark.org/review/3014 + Reviewed-by: Graham Bloice <graham.bloice@trihedral.com> + (cherry picked from commit 804409747357071631867ccbabc16a5575f5f364) + + Change-Id: Ib8bad631f2544f5ffc1aa50b274223ef4d6876d3 + Reviewed-on: https://code.wireshark.org/review/8348 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 87fed6b +Author: Gerald Combs <gerald@wireshark.org> +Date: Fri Jul 11 14:01:26 2014 -0700 + + Add strlen casts. + + Reviewed-on: https://code.wireshark.org/review/3012 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + (cherry picked from commit e2038e03007faaa29f9ed1cb3619e84bd6e03247) + + Change-Id: Ifad67f7d0943b53b007425cb9110623d000776d9 + Reviewed-on: https://code.wireshark.org/review/8347 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit afeff4f +Author: Peter Wu <peter@lekensteyn.nl> +Date: Thu Jul 3 11:23:19 2014 +0200 + + logcat: improve (crash) robustness, improve names + + The logcat version detector would crash with ASAN enabled because it did + not validate the payload length and hence a payload length of 0 would + trigger out-of-bounds access. (This happened on non-logcat data.) + + This patch tries to get rid of all magic numbers by using a structure, + improves the version detector to validate the payload length and + prevents crashes due to missing nul-terminators in the input. Older + Android kernels would create entries with __pad with random contents, so + that cannot be used to determine version for v1. Instead, use heuristics + on the priority, tag and maybe the msg field. + + Furthermore, Android is mostly (if not, always?) Little-Endian, so add + conversions where necessary (just in case WS supports BE arches). + + "microseconds" has been renamed to "milliseconds" because that is what + they are, actually. A duplicate logcat_log loop has been refactored + such that one loop is sufficient, instead of separate buffers for each + log part, a single one is now used. get_priority does not really need + a pointer, just make it accept a character. + + The output has been validated against v1 and v2 logcat binary formats + with __pad (hdr_size) equal to 0, and on attachment 9906. + + Reviewed-on: https://code.wireshark.org/review/2803 + Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com> + Tested-by: Michal Labedzki <michal.labedzki@tieto.com> + (cherry picked from commit b3b1f7c3aa2233a147294bad833b748d38fba84d) + + Conflicts: + wiretap/logcat.c + + Change-Id: I33bb20b5f9a5e03a231121a784bfffdfba0aba98 + Reviewed-on: https://code.wireshark.org/review/8346 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit ab74ebd +Author: Jeff Morriss <jeff.morriss.ws@gmail.com> +Date: Mon May 11 15:45:04 2015 -0400 + + Fix Diameter reassembly when the captured tvb length is less than 5 bytes. + + Since Diameter does heuristic checks before calling tcp_dissect_pdus() we + have to "manually" ask for more data if the tvb is too short for our + heuristics. + + Bug: 11183 + Change-Id: I14c36042306b532b53df80cc3971866b76094084 + Reviewed-on: https://code.wireshark.org/review/8405 + Reviewed-by: Evan Huus <eapache@gmail.com> + Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> + (cherry picked from commit d1f78230c9dcc631659f3e5f0008bf01115c2d69) + Conflicts: + epan/dissectors/packet-diameter.c + Reviewed-on: https://code.wireshark.org/review/8428 + +commit 8b7f2c9 +Author: Jeff Morriss <morriss@ulticom.com> +Date: Tue May 12 09:29:38 2015 -0400 + + Mark an unused parameter as unused. + + Change-Id: I83e50f7b4ebbaf99d7341a5c481c7e411a5f2773 + Reviewed-on: https://code.wireshark.org/review/8426 + Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> + +commit 34f5fa5 +Author: Michal Labedzki <michal.labedzki@tieto.com> +Date: Mon Jun 9 16:07:22 2014 +0200 + + Logcat: Fix dump formats + + Some dump formats are not exactly what should be done, + so fix them and try to little improve them (mostly by space padding %-8s) + + Reviewed-on: https://code.wireshark.org/review/2550 + Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com> + (cherry picked from commit 4a3d0b868473260c24aa66f5e3fa737b54a9fd02) + + Change-Id: Id3bc0515fac932594dd8a6759519d3d0182f9252 + Reviewed-on: https://code.wireshark.org/review/8345 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit 04e948d +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon May 11 19:40:59 2015 -0700 + + In the name of God and all that is holy, don't do that. + + http://www.bitterfilms.com/rejected.html + + 1) There is *NO* guarantee that you can safely dereference a misaligned + pointer. + + 2) There is *NO* guarantee that you are running on a little-endian + machine, so that an attempt to fetch a 32-bit integer through such a + pointer will fetch it in little-endian form. + + Instead, fetch it using tvb_get_letohl(), which 1) doesn't care about + alignment and 2) always fetches in little-endian order. + + Change-Id: I44721cbf3c4456797990cc741836c9dd8c6c3696 + Reviewed-on: https://code.wireshark.org/review/8423 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 2693e1d1081ac8a5f3cf15b5961d0229775e25e6) + Reviewed-on: https://code.wireshark.org/review/8424 + +commit d989452 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon May 11 15:10:54 2015 -0700 + + Do not assume the data field of an address structure is an aligned pointer. + + There is *no* guarantee that it's aligned on a 4-byte boundary, and + there is *no* guarantee that you can safely dereference an unaligned + pointer. See bug 11172 for a crash on Solaris/SPARC caused by those + assumptions both being false. + + Change-Id: I001a71bf060f00c48ae5c586dea6cc3463d49d9a + Reviewed-on: https://code.wireshark.org/review/8415 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit e8469d3 +Author: Michael Mann <mmann78@netscape.net> +Date: Sun May 10 12:53:10 2015 -0400 + + MEGACO - remember "short form" format and don't recheck it. + + Bug: 10909 + Change-Id: I21eb0f520029fd8f84e6bef63dddeddd9df2f799 + Reviewed-on: https://code.wireshark.org/review/8383 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit 43c69c8 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun May 10 08:11:28 2015 -0700 + + [Automatic update for 2015-05-10] + + Update manuf, services enterprise-numbers, translations, and other items. + + Change-Id: I6f824423e7cfc632daca42ade029fde9faf32fd5 + Reviewed-on: https://code.wireshark.org/review/8377 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 8c4ee42 +Author: Jamil Nimeh <jnimeh@gmail.com> +Date: Fri May 8 20:28:20 2015 +0200 + + SSL: fix dissection of CertificateStatus message with OCSP_MULTI + + Bug: 11181 + Change-Id: I05769e254f2e276e1594d7ed5cb50496e16cfc2f + Reviewed-on: https://code.wireshark.org/review/8356 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 6cf626e3ad1ded1fc36c7d7fa8054d0aeb2ecde1) + Reviewed-on: https://code.wireshark.org/review/8366 + +commit 4e04dea +Author: Jiřà Engelthaler <engycz@gmail.com> +Date: Wed May 6 17:34:54 2015 +0200 + + packet-iec104: make object number filterable if SQ flag is set + + Make object number filterable again if SQ flag is set which breaks my commit 785fab7f + Sample capture https://wiki.wireshark.org/SampleCaptures?action=AttachFile&do=get&target=IEC104_SQ.pcapng + + Change-Id: I450b86452876fab26e1a9f1bfc2f729573c52124 + Reviewed-on: https://code.wireshark.org/review/8313 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit d8ccd27181e37c9846ec8ac6ffd4eccb33840016) + Reviewed-on: https://code.wireshark.org/review/8326 + +commit 187bdef +Author: Michael Mann <mmann78@netscape.net> +Date: Tue May 5 07:54:25 2015 -0400 + + Set tap filter when WLAN "Limit to display filter" option is checked. + + Bug: 11160 + Change-Id: Ic2f1475a3b51eb8919435f1064fc0faf3c4da3eb + Reviewed-on: https://code.wireshark.org/review/8296 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 050de6aa2ff73e3c4ac8041703ffd8437912ab1f) + Reviewed-on: https://code.wireshark.org/review/8315 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit cb15a7b +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue May 5 15:52:26 2015 -0700 + + Prep for 1.12.5. + + Change-Id: I19bdd3ed5204337af16916870aa9abc43cf2bcd4 + Reviewed-on: https://code.wireshark.org/review/8305 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + commit 1f02f2d Author: Gerald Combs <gerald@wireshark.org> Date: Tue May 5 13:52:13 2015 -0700 @@ -1,4 +1,4 @@ - Wireshark 1.12.4 Release Notes + Wireshark 1.12.5 Release Notes __________________________________________________________________ What is Wireshark? @@ -12,70 +12,67 @@ What's New Bug Fixes The following vulnerabilities have been fixed. - * [1]wnpa-sec-2015-06 - The ATN-CPDLC dissector could crash. ([2]Bug 9952) [3]CVE-2015-2187 - * [4]wnpa-sec-2015-07 - The WCP dissector could crash. ([5]Bug 10844) [6]CVE-2015-2188 - * [7]wnpa-sec-2015-08 - The pcapng file parser could crash. ([8]Bug 10895) [9]CVE-2015-2189 - * [10]wnpa-sec-2015-09 - The LLDP dissector could crash. ([11]Bug 10983) [12]CVE-2015-2190 - * [13]wnpa-sec-2015-10 - The TNEF dissector could go into an infinite loop. Discovered by - Vlad Tsyrklevich. ([14]Bug 11023) [15]CVE-2015-2191 - * [16]wnpa-sec-2015-11 - The SCSI OSD dissector could go into an infinite loop. Discovered - by Vlad Tsyrklevich. ([17]Bug 11024) [18]CVE-2015-2192 + * [1]wnpa-sec-2015-12 + The LBMR dissector could go into an infinite loop. ([2]Bug 11036) + [3]CVE-2015-3808 [4]CVE-2015-3809 + * [5]wnpa-sec-2015-13 + The WebSocket dissector could recurse excessively. ([6]Bug 10989) + [7]CVE-2015-3810 + * [8]wnpa-sec-2015-14 + The WCP dissector could crash while decompressing data. ([9]Bug + 10978) [10]CVE-2015-3811 + * [11]wnpa-sec-2015-15 + The X11 dissector could leak memory. ([12]Bug 11088) + [13]CVE-2015-3812 + * [14]wnpa-sec-2015-16 + The packet reassembly code could leak memory. ([15]Bug 11129) + [16]CVE-2015-3813 + * [17]wnpa-sec-2015-17 + The IEEE 802.11 dissector could go into an infinite loop. ([18]Bug + 11110) [19]CVE-2015-3814 + * [20]wnpa-sec-2015-18 + The Android Logcat file parser could crash. Discovered by Hanno + Böck. ([21]Bug 11188) [22]CVE-2015-3815 The following bugs have been fixed: - * RTP player crashes on decode of long call: BadAlloc (insufficient - resources for operation). ([19]Bug 2630) - * "Telephony->SCTP->Analyse This Association" crashes Wireshark on - manufactured SCTP packet. ([20]Bug 9849) - * IPv6 Mobility Header Link Layer Address is parsed incorrectly. - ([21]Bug 10006) - * DNS NXT RR is parsed incorrectly. ([22]Bug 10615) - * IPv6 AUTH mobility option parses Mobility SPI and Authentication - Data incorrectly. ([23]Bug 10626) - * IPv6 Mobility Header Link-Layer Address Mobility Option is parsed - incorrectly. ([24]Bug 10627) - * HTTP chunked response includes data beyond the chunked response. - ([25]Bug 10707) - * DHCP Option 125 Suboption: (1) option-len always expects 1 but - specification allows for more. ([26]Bug 10784) - * Incorrect decoding of IPv4 Interface/Neighbor Address sub-TLVs in - Extended IS Reachability TLV of IS-IS. ([27]Bug 10837) - * Little-endian OS X Bluetooth PacketLogger files aren't handled. - ([28]Bug 10861) - * X.509 certificate serial number incorrectly interpreted as negative - number. ([29]Bug 10862) - * Malformed Packet on rsync-version with length 2. ([30]Bug 10863) - * ZigBee epoch time is incorrectly displayed in OTA cluster. ([31]Bug - 10872) - * BGP EVPN - Route Type 4 - "Invalid length of IP Address" - "Expert - Info" shows a false error. ([32]Bug 10873) - * Bad bytes read for extended rnc id value in GTP dissector. ([33]Bug - 10877) - * "ServiceChangeReasonStr" messages are not shown in txt generated by - tshark. ([34]Bug 10879) - * Clang ASAN : AddressSanitizer: global-buffer-overflow ANSI. - ([35]Bug 10897) - * MEGACO wrong decoding on media port. ([36]Bug 10898) - * Wrong media format. ([37]Bug 10899) - * BSSGP Status PDU decoding fault (missing Mandatory element (0x04) - BVCI for proper packet). ([38]Bug 10903) - * DNS LOC Precision missing units. ([39]Bug 10940) - * Packets on OpenBSD loopback decoded as raw not null. ([40]Bug - 10956) - * Display Filter Macro unable to edit. ([41]Bug 10957) - * IPv6 Local Mobility Anchor Address mobility option code is treated - incorrectly. ([42]Bug 10961) - * SNTP server list improperly formatted in DHCPv6 packet details. - ([43]Bug 10964) - * Juniper Packet Mirror dissector expects ipv6 flow label = 0. - ([44]Bug 10976) - * NS Trace (NetScaler Trace) file format is not able to export - specified packets. ([45]Bug 10998) + * Wireshark crashes if "Update list of packets in real time" is + disabled and a display filter is applied while capturing. ([23]Bug + 6217) + * EAPOL 4-way handshake information wrong. ([24]Bug 10557) + * RPC NULL calls incorrectly flagged as malformed. ([25]Bug 10646) + * Wireshark relative ISN set incorrectly if raw ISN set to 0. + ([26]Bug 10713) + * Buffer overrun in encryption code. ([27]Bug 10849) + * Crash when use Telephony / Voip calls. ([28]Bug 10885) + * ICMP Parameter Problem message contains Length of original datagram + is treated as the total IPv4 length. ([29]Bug 10991) + * ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. ([30]Bug + 10992) + * Missing field "tcp.pdu.size" in TCP stack. ([31]Bug 11007) + * Sierra EM7345 marks MBIM packets as NCM. ([32]Bug 11018) + * Possible infinite loop DoS in ForCES dissector. ([33]Bug 11037) + * "Decode As..." crashes when a packet dialog is open. ([34]Bug + 11043) + * Interface Identifier incorrectly represented by Wireshark. ([35]Bug + 11053) + * "Follow UDP Stream" on mpeg packets crashes wireshark v.1.12.4 + (works fine on v.1.10.13). ([36]Bug 11055) + * Annoying popup when trying to capture on bonds. ([37]Bug 11058) + * Request-response cross-reference in USB URB packets incorrect. + ([38]Bug 11072) + * Right clicking in Expert Infos to create a filter (duplicate IP) + results in invalid filters. ([39]Bug 11073) + * CanOpen dissector fails on frames with RTR and 0 length. ([40]Bug + 11083) + * Typo in secp521r1 curve wrongly identified as sect521r1. ([41]Bug + 11106) + * packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn't filter ENUM. ([42]Bug + 11120) + * Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". + ([43]Bug 11141) + * Missing Makefile.nmake in ansi1/Kerberos directory. ([44]Bug 11155) + * Can't build tshark without the Qt packages installed unless + --without-qt is specified. ([45]Bug 11157) New and Updated Features @@ -87,18 +84,14 @@ What's New Updated Protocol Support - ACN, ANSI IS-637-A, AppleMIDI, ATN-CPDLC, BGP, BSSGP, CMIP, DHCP, - DHCPv6, DIS, DLM3, DMP, DNS, Extreme Networks, ForCES, FTAM, GMHDR, GSM - A BSSMAP, GSM A-bis OML, GSM MAP, GSM RLC MAC, GTP, H.248, H.264, HTTP, - IEEE 802.11, IPv6, IS-IS, ISMACryp, J1939, Juniper Jmirror, KDP, L2CAP, - LDAP, LLDP, MGCP, MIP6, NBNS, NET/ROM, Netflow, Novell PKIS, PANA, - PPPoE, RSL, RSYNC, RTMPT, RTP, SCSI OSD, SDP, SMB Pipe, SMPP, - SYNCHROPHASOR, TETRA, TiVoConnect, TNEF, USB HID, V.52, VSS-Monitoring, - X.509AF, Zebra, and ZigBee + AllJoyn, ASN.1 PER, ATM, CANopen, Diameter, ForCES, GSM RLC/MAC, + GSMTAP, ICMP, IEC-60870-5-104, IEEE 802.11, IMF, IP, LBMC, LBMR, LDAP, + LPP, MBIM, MEGACO, MP2T, PKCS-1, PPP IPv6CP, RPC, SPNEGO, SRVLOC, SSL, + T.38, TCP, USB, WCP, WebSocket, X11, and ZigBee ZCL New and Updated Capture File Support - NetScaler, PacketLogger, and Pcapng + and Android Logcat Savvius OmniPeek Visual Networks __________________________________________________________________ Getting Wireshark @@ -165,55 +158,55 @@ Frequently Asked Questions A complete FAQ is available on the [62]Wireshark web site. __________________________________________________________________ - Last updated 2015-03-04 08:53:00 PST + Last updated 2015-05-12 13:03:24 PDT References - 1. https://www.wireshark.org/security/wnpa-sec-2015-06.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952 - 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187 - 4. https://www.wireshark.org/security/wnpa-sec-2015-07.html - 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844 - 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188 - 7. https://www.wireshark.org/security/wnpa-sec-2015-08.html - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895 - 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189 - 10. https://www.wireshark.org/security/wnpa-sec-2015-09.html - 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983 - 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190 - 13. https://www.wireshark.org/security/wnpa-sec-2015-10.html - 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023 - 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191 - 16. https://www.wireshark.org/security/wnpa-sec-2015-11.html - 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024 - 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192 - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2630 - 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9849 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10006 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10615 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10626 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10627 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10707 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10784 - 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10837 - 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10861 - 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10862 - 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10863 - 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10872 - 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10873 - 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10877 - 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10879 - 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10897 - 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10898 - 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10899 - 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10903 - 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10940 - 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10956 - 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10957 - 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10961 - 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10964 - 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10976 - 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10998 + 1. https://www.wireshark.org/security/wnpa-sec-2015-12.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036 + 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808 + 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809 + 5. https://www.wireshark.org/security/wnpa-sec-2015-13.html + 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989 + 7. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810 + 8. https://www.wireshark.org/security/wnpa-sec-2015-14.html + 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978 + 10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811 + 11. https://www.wireshark.org/security/wnpa-sec-2015-15.html + 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088 + 13. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812 + 14. https://www.wireshark.org/security/wnpa-sec-2015-16.html + 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129 + 16. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813 + 17. https://www.wireshark.org/security/wnpa-sec-2015-17.html + 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110 + 19. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814 + 20. https://www.wireshark.org/security/wnpa-sec-2015-18.html + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188 + 22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815 + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6217 + 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10557 + 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10646 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10713 + 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10849 + 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10885 + 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10991 + 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10992 + 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11007 + 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11018 + 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11037 + 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11043 + 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11053 + 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11055 + 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11058 + 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11072 + 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11073 + 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11083 + 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11106 + 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11120 + 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11141 + 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11155 + 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11157 46. http://www.wireshark.org/download.html 47. http://www.wireshark.org/download.html#thirdparty 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc index a6deab3b91..8b7091779e 100644 --- a/docbook/release-notes.asciidoc +++ b/docbook/release-notes.asciidoc @@ -20,7 +20,8 @@ The LBMR dissector could go into an infinite loop. // Fixed in master-1.12: g524d585 // Fixed in master-1.10: N/A (ws-buglink:11036[]) -//cve-idlink:2015-XXXX[] +cve-idlink:2015-3808[] +cve-idlink:2015-3809[] * ws-salink:2015-13[] + @@ -29,7 +30,7 @@ The WebSocket dissector could recurse excessively. // Fixed in master-1.12: gcdb1fc6 // Fixed in master-1.10: Unknown (ws-buglink:10989[]) -//cve-idlink:2015-XXXX[] +cve-idlink:2015-3810[] * ws-salink:2015-14[] + @@ -38,7 +39,7 @@ The WCP dissector could crash while decompressing data. // Fixed in master-1.12: g65db378 // Fixed in master-1.10: ge5a9cf3 (ws-buglink:10978[]) -//cve-idlink:2015-XXXX[] +cve-idlink:2015-3811[] * ws-salink:2015-15[] + @@ -47,7 +48,7 @@ The X11 dissector could leak memory. // Fixed in master-1.12: g7b58f02 // Fixed in master-1.10: g7cb179e (ws-buglink:11088[]) -//cve-idlink:2015-XXXX[] +cve-idlink:2015-3812[] * ws-salink:2015-16[] + @@ -56,7 +57,7 @@ The packet reassembly code could leak memory. // Fixed in master-1.12: g5bbf0d2 // Fixed in master-1.10: Unknown (ws-buglink:11129[]) -//cve-idlink:2015-XXXX[] +cve-idlink:2015-3813[] * ws-salink:2015-17[] + @@ -65,7 +66,16 @@ The IEEE 802.11 dissector could go into an infinite loop. // Fixed in master-1.12: gc3bee61 // Fixed in master-1.10: gcd4dd9a (ws-buglink:11110[]) -//cve-idlink:2015-XXXX[] +cve-idlink:2015-3814[] + +* ws-salink:2015-18[] ++ +The Android Logcat file parser could crash. Discovered by Hanno Böck. +// Fixed in master: gb3b1f7c, ge2038e0, g8044097, ef1b11f +// Fixed in master-1.12: g489680c, g87fed6b, g560b90b, g3d8f9d4, g09eda88, g299e206 +// Fixed in master-1.10: N/A +(ws-buglink:11188[]) +cve-idlink:2015-3815[] The following bugs have been fixed: @@ -136,6 +146,7 @@ AllJoyn ATM ASN.1 PER CANopen +Diameter ForCES GSM RLC/MAC GSMTAP @@ -144,16 +155,19 @@ IEC-60870-5-104 IEEE 802.11 IMF IP +LBMC LBMR LDAP LPP MBIM +MEGACO MP2T PKCS-1 PPP IPv6CP RPC SPNEGO SRVLOC +SSL T.38 TCP USB @@ -166,7 +180,7 @@ ZigBee ZCL === New and Updated Capture File Support --sort-and-group-- -Savvius OmniPeek, Visual Networks +Android Logcat, Savvius OmniPeek, Visual Networks --sort-and-group-- == Getting Wireshark diff --git a/version.conf b/version.conf index 6dedd7c96a..9480b2f829 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add a "rc" to the version. -enable: 1 -pkg_format: rc0-%# -pkg_enable: 1 +#enable: 1 +#pkg_format: rc0-%# +#pkg_enable: 1 # Final release: Disable package version stamps. -#enable: 1 -#pkg_format: -#pkg_enable: 0 +enable: 1 +pkg_format: +pkg_enable: 0 |