aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGerald Combs <gerald@wireshark.org>2018-11-28 09:35:22 -0800
committerGerald Combs <gerald@wireshark.org>2018-11-28 18:14:12 +0000
commita6cc2066cf056baae5dbb3b354f2f1f9fd065f0e (patch)
treedf693cf382544b31283067f76d4b3b1a959b9ce4
parentb9dca4f2132cd668f811c1ee9102dca682a5d1e9 (diff)
downloadwireshark-a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e.tar.gz
wireshark-a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e.tar.bz2
wireshark-a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e.zip
Change-Id: I4a895239c73514b110ff66bee9afc76c5ba85d10 Reviewed-on: https://code.wireshark.org/review/30825 Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r--ChangeLog866
-rw-r--r--NEWS156
-rw-r--r--docbook/release-notes.asciidoc48
-rw-r--r--version.conf12
4 files changed, 995 insertions, 87 deletions
diff --git a/ChangeLog b/ChangeLog
index e69de29bb2..e5a8d53175 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -0,0 +1,866 @@
+commit f2c88e4594
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Nov 28 09:35:22 2018 -0800
+
+ Build 2.4.11.
+
+ Change-Id: I4a895239c73514b110ff66bee9afc76c5ba85d10
+
+commit b9dca4f213
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue Nov 27 17:38:55 2018 -0800
+
+ Update the release notes for 2.4.11.
+
+ Change-Id: Ibe75eb946b4a005edb8c5cb1d0269c3d36ce7aa2
+ Reviewed-on: https://code.wireshark.org/review/30817
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit d9b8b93f0e
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue Nov 27 13:38:10 2018 -0800
+
+ IxVeriWave: Fix a buffer boundary.
+
+ Pass the correct buffer size to find_signature so that we don't read
+ past it.
+
+ Bug: 15279
+ Change-Id: I822ed0fe8b48196dadd9c0062ed53fa1c4f6f404
+ Reviewed-on: https://code.wireshark.org/review/30809
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 332df929a9966fda2cd3aa30a5a107e5b2bfa360)
+ Reviewed-on: https://code.wireshark.org/review/30814
+
+commit 3e319db110
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue Nov 27 12:23:31 2018 -0800
+
+ pvfs2: Add a pointer check.
+
+ Make sure a pointer isn't NULL before trying to dereference it.
+
+ Bug: 15280
+ Change-Id: If2686940a0347154d9a59f5e2141511e7e1f49a4
+ Reviewed-on: https://code.wireshark.org/review/30807
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit a8c93de0b0130ed5f4aab59338372783054898ea)
+ Reviewed-on: https://code.wireshark.org/review/30812
+
+commit 37057d45a4
+Author: Jaap Keuter <jaap.keuter@xs4all.nl>
+Date: Mon Nov 26 21:27:55 2018 +0100
+
+ BGP: Fix dissection of MCAST-VPN NLRI
+
+ Due to a incorrect check the details of MCAST-VPN NLRI were
+ never dissected. Also the Originating Router's IP Addr of a
+ S-PMSI A-D Route was not dissected.
+
+ Bug: 15307
+ Change-Id: Ic7481ed034e4cbf0dcab4aa150f05da2f5aac508
+ Signed-off-by: Jaap Keuter <jaap.keuter@xs4all.nl>
+ Reviewed-on: https://code.wireshark.org/review/30796
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit f81083731888d0d17f5072652aa60e7d6d6c1067)
+ Reviewed-on: https://code.wireshark.org/review/30801
+
+commit df57e134b9
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Nov 25 08:38:51 2018 +0000
+
+ [Automatic update for 2018-11-25]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ia4c4fd305d7f4103cff22973ca117bddd18ea0e1
+ Reviewed-on: https://code.wireshark.org/review/30787
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ad5daa789b
+Author: Erika Szelleova <szelleerika@gmail.com>
+Date: Sat Jun 2 14:43:40 2018 +0200
+
+ VoIP: fix in prepare filter for VOIP calls
+
+ Make sure that the filter for VoIP calls includes RTP streams when calling
+ Prepare filter.
+
+ Bug: 13440
+ Change-Id: Ia55073151817b88b3fa6a3fd30f98fdf683621a4
+ Reviewed-on: https://code.wireshark.org/review/27955
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 555067724aec4667ea17ff6e514466b2547c9351)
+ Reviewed-on: https://code.wireshark.org/review/30780
+ Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
+
+commit 0398d9af1c
+Author: Jason Cohen <kryojenik2@gmail.com>
+Date: Tue Nov 20 16:23:09 2018 -0600
+
+ Fix reassembly of larger TACACS+ accounting messages
+
+ Since TACACS+ is TCP only, switched to tcp_dissect_pdus
+
+ Bug: 15293
+ Change-Id: I8cee8a1f474ae866c59f94ec8ecbd412e5189e89
+ Reviewed-on: https://code.wireshark.org/review/30748
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/30750
+
+commit e8fedc7fb9
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Nov 20 10:26:39 2018 -0800
+
+ Fix expert info message for wrong option length.
+
+ Bug: 15290
+ Change-Id: Id5b4f6a899fea542f5d50e8be991d7cca623fd46
+ Reviewed-on: https://code.wireshark.org/review/30744
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 8beab04229803af96a1143cfef6915719e319e58)
+ Reviewed-on: https://code.wireshark.org/review/30746
+
+commit 584915a4d3
+Author: Robert Cragie <Robert.Cragie@arm.com>
+Date: Mon Nov 19 13:53:43 2018 +0000
+
+ Fix MLE security suite display
+
+ Security suite 0xff (no security) is displayed incorrectly as 0x7f.
+
+ Bug: 15288
+ Change-Id: Ic899ca724a4a958520e34d522c211e5c625d43ce
+ Reviewed-on: https://code.wireshark.org/review/30713
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/30721
+ Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl>
+ Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
+
+commit 4523e8bf17
+Author: Vasil Velichkov <vvvelichkov@gmail.com>
+Date: Sun Nov 18 15:02:21 2018 +0200
+
+ .mailmap: fix duplicate entry
+
+ Change-Id: I4498178e0eae3cec45514cb11185e906edffa7c4
+ Reviewed-on: https://code.wireshark.org/review/30694
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 2294ac3dfe3e3bb1fd74bfa5cd5523fd45b22c1c)
+ (cherry picked from commit 065c9f26041ca5b3e46d233c8aef9df9dd6e997f)
+ Reviewed-on: https://code.wireshark.org/review/30699
+
+commit 9e1f588c16
+Author: Lorand Jakab <ljakab@ac.upc.edu>
+Date: Fri Nov 16 13:03:55 2018 +0100
+
+ LISP: Switch to proto_tree_add_subtree_format()
+
+ When the LISP dissector was initially written, it followed a different
+ pattern for adding subtrees with a text label, which needs to be
+ modified while dissecting: proto_tree_add_item() +
+ proto_item_append_text() + proto_item_add_subtree().
+
+ This commit updates the code to use the more elegant
+ proto_tree_add_subtree_format() call.
+
+ Change-Id: Icb6424be3c9cdecbfe9bb5aa2d39f3ad3d1499e0
+ Signed-off-by: Lorand Jakab <ljakab@ac.upc.edu>
+ Reviewed-on: https://code.wireshark.org/review/30655
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/30703
+
+commit dfc2b2720a
+Author: Eugene Adell <eugene.adell@gmail.com>
+Date: Sun May 20 03:57:42 2018 -0700
+
+ SSL: Send the record_length to the dissect_ssl3_alert and use it
+
+ Bug: 14712
+ Change-Id: I3550f0da76a9acd3619d243b5a6e1d04d6734b62
+ Reviewed-on: https://code.wireshark.org/review/27670
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit 9b92d825cba5c4d56698cccddfe1d6d570c95e87)
+ Reviewed-on: https://code.wireshark.org/review/30701
+
+commit d10d3c9672
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Nov 18 08:42:42 2018 +0000
+
+ [Automatic update for 2018-11-18]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I22bfb5a21a8ece92794189c2e8c8d2adc42c3f08
+ Reviewed-on: https://code.wireshark.org/review/30689
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 3b7555d32d
+Author: Jeff Morriss <jeff.morriss.ws@gmail.com>
+Date: Fri Nov 9 15:16:35 2018 -0500
+
+ MMSE: catch length overflows to avoid infinite loop.
+
+ After fetching a length from the packet ensure those bytes exist to
+ avoid integer overflows by callers (while avoiding having to ensure
+ every caller checks for overflows).
+
+ Also add a check to ensure the loop in question is progressing through
+ the TVB; report a dissector bug if it doesn't.
+
+ Bug: 15250
+ Bug: 15246
+ Change-Id: I9434bfe9d530942fd45342690383df2decacdba1
+ Reviewed-on: https://code.wireshark.org/review/30560
+ Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 1ddaf1a0944ffe95d69717ac9fdc60824932f676)
+ Reviewed-on: https://code.wireshark.org/review/30673
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+
+commit eefec0916c
+Author: Lorand Jakab <ljakab@ac.upc.edu>
+Date: Wed Nov 14 17:27:37 2018 +0100
+
+ LISP: Fix action bits decoding
+
+ Change-Id: I76f5e10fbc5ca0071d1444e31ce4c8fba639c3bc
+ Signed-off-by: Lorand Jakab <ljakab@ac.upc.edu>
+ Reviewed-on: https://code.wireshark.org/review/30630
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 6f3e7a6d80f55809560d7431a12bc2f3b0a480d7)
+ Reviewed-on: https://code.wireshark.org/review/30637
+
+commit 46faaa5668
+Author: Anders Broman <anders.broman@ericsson.com>
+Date: Wed Nov 14 14:24:22 2018 +0100
+
+ nettrace_3gpp_32_423: Don't crash on error and improve error output.
+
+ Change-Id: I4ea7ccf51321d6ce316456bde24aa37880ea52ed
+ Reviewed-on: https://code.wireshark.org/review/30627
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit db7653fd2ce8542a8648dad0c8360c3eb82e6ec0)
+ Reviewed-on: https://code.wireshark.org/review/30635
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit ada54b8ea9
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Wed Nov 14 09:40:30 2018 +0100
+
+ ui: add missing break.
+
+ Error:
+ ../ui/alert_box.c: In function ‘cfile_write_failure_alert_box’:
+ ../ui/alert_box.c:359:13: error: this statement may fall through [-Werror=implicit-fallthrough=]
+ simple_error_message_box(
+ ^~~~~~~~~~~~~~~~~~~~~~~~~
+ "Frame %u%s has a network type that differs from the network type of earlier packets, which isn't supported in a \"%s\" file.",
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ framenum, in_file_string,
+ ~~~~~~~~~~~~~~~~~~~~~~~~~
+ wtap_file_type_subtype_string(file_type_subtype));
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ ../ui/alert_box.c:364:9: note: here
+ case WTAP_ERR_PACKET_TOO_LARGE:
+ ^~~~
+
+ Change-Id: I55464afff5625ae8c587470e417234560c7e606c
+ Reviewed-on: https://code.wireshark.org/review/30623
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit f3b82ffae752f59e22dee7506322e644ca2144d1)
+ Reviewed-on: https://code.wireshark.org/review/30625
+
+commit 2713dcbd21
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Nov 13 19:38:12 2018 -0800
+
+ Catch attempts to write multiple encapsulation types if unsupported.
+
+ If, in the process of opening the input file, we determine that it has
+ packets of more than one link-layer type, we can catch attempts to write
+ that file to a file of a format that doesn't support more than one
+ link-layer type at the time we try to open the output file.
+
+ If, however, we don't discover that the file has more than one
+ link-layer type until we've already created the output file - for
+ example, if we have a pcapng file with a new IDB, with a different
+ link-layer type from previous IDBs, after packet blocks for the earlier
+ interfces - we can't catch that until we try to write the packet.
+
+ Currently, that causes the packet's data to be written out as is, so the
+ output file claims it's of the file's link-layer type, causing programs
+ reading the file to misdissect the packet.
+
+ Report WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED on the write attempt
+ instead, and have a nicer error message for
+ WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED on a write.
+
+ Change-Id: Ic41f2e4367cfe5667eb30c88cc6d3bfe422462f6
+ Reviewed-on: https://code.wireshark.org/review/30617
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 3aec5e1a2882a04aae33207750e9053d5f73174b)
+ Reviewed-on: https://code.wireshark.org/review/30619
+
+commit 82c561482d
+Author: Vasil Velichkov <vasko@vvelichkov2.dev.opencode.com>
+Date: Wed Nov 7 21:33:41 2018 +0200
+
+ tshark: Print the packets' comments in the expert info
+
+ Previously 'tshark -z expert' was failing with abort when a packet
+ contains a comment
+
+ - Add a new comment parameter and update the tshark's manual page
+ - Add a new comment_level severity and change the default lavel to it.
+ - Add various 'tshark -z expert' tests
+
+ Change-Id: I188317da5e00019b8f2b725f0fe84942f774520f
+ Reviewed-on: https://code.wireshark.org/review/30610
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit ec95ae98ed29190f3df044e8676d6aed101405c0)
+ Reviewed-on: https://code.wireshark.org/review/30612
+
+commit beadcb2c87
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Tue Nov 13 12:40:45 2018 +0100
+
+ extcap: Allow ASCII '0' in preference name
+
+ Update the regex to also allow '0' in the preference name.
+
+ Change-Id: I881079b579b9193dd31dda2150d9a50c000c0dd3
+ Reviewed-on: https://code.wireshark.org/review/30602
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit b2c244e92d625d1e312b3b205b87a74850cc5f1f)
+ Reviewed-on: https://code.wireshark.org/review/30607
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit 27bd37d8d090db880c6afb4242f902417cb970dd)
+ Reviewed-on: https://code.wireshark.org/review/30608
+
+commit aa1ec78985
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Nov 12 22:17:49 2018 -0800
+
+ Move the Linux ARPHRD_ types to epan/arptypes.h.
+
+ Change-Id: I6fa9593af64e8af1ade4f049ea949989adfd00c7
+ Reviewed-on: https://code.wireshark.org/review/30595
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 88e98d876ec8e85db330654f7203805dd642a1a3)
+ Reviewed-on: https://code.wireshark.org/review/30597
+
+commit 1bbf3b23e1
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Nov 12 19:38:12 2018 -0800
+
+ Fix dissection of 802.11+radiotap frames in Linux "cooked" captures.
+
+ Those frames *don't* have their link-layer headers stripped, even on
+ PF_PACKET/SOCK_DGRAM captures (hopefully, nobody will consider that a
+ bug and "fix" it).
+
+ The "hatype" field is the ARPHRD_ value for the adapter, as returned by
+ SIOCGIFHWADDR; in monitor mode, those frames will have an hatype of
+ ARPHRD_IEEE80211_RADIOTAP. Add an "sll.hatype" dissector table, which
+ we check before checking the "sll.ltype" dissector table, and have the
+ radiotap dissector register in that table.
+
+ We still use the special hack for an hatype of ARPHRD_NETLINK, because,
+ for *those* frames, the "protocol" field of the nominal SLL header is
+ the netlink family, not an Ethertype or anything else that the SLL
+ dissector would handle.
+
+ Change-Id: If503a7daa9133adf1b8c330ec28c4c824d4f551d
+ Reviewed-on: https://code.wireshark.org/review/30592
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit c348dd4b106621f85079ebaf8202229c689ea93b)
+ Reviewed-on: https://code.wireshark.org/review/30594
+
+commit da15e7564e
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Nov 11 08:41:13 2018 +0000
+
+ [Automatic update for 2018-11-11]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Id6744be0a2f87d55a68eca6e09da5c5efc749ea9
+ Reviewed-on: https://code.wireshark.org/review/30575
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 7ad23870b0
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Nov 4 08:45:29 2018 +0000
+
+ [Automatic update for 2018-11-04]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Icf63148a64d0b0c458e088237cc6e2e84d3a97ba
+ Reviewed-on: https://code.wireshark.org/review/30501
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit d5e8fb0146
+Author: Roland Knall <rknall@gmail.com>
+Date: Tue Oct 30 13:10:21 2018 +0100
+
+ macos: Prevent darkmode from appearing
+
+ Prevent dark mode from being used on newer versions of mac os x, as long as
+ Qt does not allow proper dark mode handling
+
+ Change-Id: Ifee14ec690331689b0a8a7486829dd129a2687b4
+ Reviewed-on: https://code.wireshark.org/review/30425
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ Petri-Dish: Roland Knall <rknall@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Roland Knall <rknall@gmail.com>
+ (cherry picked from commit 81c4f74a1921e8c89fcf200beb6892b78a7297d9)
+ Reviewed-on: https://code.wireshark.org/review/30438
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit c9ca0db048
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Oct 28 08:46:44 2018 +0000
+
+ [Automatic update for 2018-10-28]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I0995a518562277493a0418f76f3a7b61cf581d3b
+ Reviewed-on: https://code.wireshark.org/review/30400
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 0acd23dd64
+Author: Uli Heilmeier <uh@heilmeier.eu>
+Date: Thu Oct 25 11:11:10 2018 +0200
+
+ SV: Fix handling data length
+
+ Read not more data than protocol length defines.
+
+ Bug: 15224
+ Change-Id: I90e003c231fe75686065f8c44f70b5bb1df472c9
+ Reviewed-on: https://code.wireshark.org/review/30377
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/30383
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit eb4a038600
+Author: Uli Heilmeier <uh@heilmeier.eu>
+Date: Wed Oct 24 16:00:27 2018 +0200
+
+ ISUP: fix offset for Generic name
+
+ Adding the name to the tree at the same offset (1) where we read it.
+
+ Bug: 15236
+ Change-Id: Iefe1a74d7f4d547a049e0b82dca51964e48fa9b7
+ Reviewed-on: https://code.wireshark.org/review/30370
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit b6598d5ec3358d5f3b91dcde7ee36c5ea045459e)
+ Reviewed-on: https://code.wireshark.org/review/30374
+
+commit 7c90937c52
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Wed Oct 24 12:02:15 2018 +0200
+
+ GSM A BSSMAP: fix Number Of MSs IE dissection
+
+ This IE is of TV type, not TLV type, so there is no length check to
+ perform.
+
+ Bug: 15237
+ Change-Id: Iafee6e43984d70cd046452687518b9cad5d30957
+ Reviewed-on: https://code.wireshark.org/review/30364
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/30368
+
+commit 9c8645ec7b
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Sun Oct 21 15:10:57 2018 +0200
+
+ LBMPDM: fix heap-buffer-overflow (write) in dissect_segment_ofstable
+
+ id_list and ofs_list contain offsets read directly from the packet.
+ While the field type is FT_UINT32, it is somehow interpreted as signed
+ number. This means that ofs_table->offset_list[id_list[idx]]=... could
+ in fact result in an arbitrary write before "ofs_table->offset_list" due
+ to id_list[idx] being negative.
+
+ Another way for id_list[idx] to remain negative (-1) is for the loop to
+ terminate before all "field_count" elements are set. Thus, remove the
+ "datalen_remaining >= L_LBMPDM_OFFSET_ENTRY_T" check, if the offset is
+ invalid the proto_tree_add_item accessors will throw an exception.
+
+ Fixes the crash in the linked bug. Regression tested against the 8
+ capture files from bug 9718, its dissection results are still the same.
+
+ Bug: 15132
+ Change-Id: If5d2f11ee47578acb80bc43ba7ed16adb27e0c02
+ Fixes: v1.11.3-rc1-2270-g2f4ca9c8d9 ("Initial checkin of LBM aka 29West dissectors. See Bug 9718.")
+ Reviewed-on: https://code.wireshark.org/review/30300
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 5797f602741a7505c18c2e0c505e963ca3349153)
+ Reviewed-on: https://code.wireshark.org/review/30347
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit 75e153fc31
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Oct 22 02:07:09 2018 -0700
+
+ No need for the debugging output.
+
+ The chmods seem to be working.
+
+ Change-Id: I0f85a1428de511497597a3fd304c700ea1a1f846
+ Reviewed-on: https://code.wireshark.org/review/30331
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 433268130015f7faab0c964e484df29ad1628d43)
+ Reviewed-on: https://code.wireshark.org/review/30333
+
+commit 6df201589b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Oct 22 00:35:29 2018 -0700
+
+ Fix quoting.
+
+ Change-Id: I3a0a8c661b1fec2ea4475eb9fe1d5c8a8ed7bbb5
+ Reviewed-on: https://code.wireshark.org/review/30328
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 714c5dc2ab4075dd03e1df972b8e52f6eca9831f)
+ Reviewed-on: https://code.wireshark.org/review/30330
+
+commit 34d4ba0920
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Oct 21 23:30:58 2018 -0700
+
+ Make the chmod verbose.
+
+ For some reason it's *not* taking away write permission; make it verbose
+ to try to debug that.
+
+ Change-Id: I180309953d36798d2da3a74959cdd934adc5a4a3
+ Reviewed-on: https://code.wireshark.org/review/30325
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit a2514faf1dfcae8bef37c1e30a7a3dc4858f0332)
+ Reviewed-on: https://code.wireshark.org/review/30327
+
+commit 3d74b489f6
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Oct 21 23:27:47 2018 -0700
+
+ Don't unload the XQuartzFixer job if it doesn't exist.
+
+ But *do* get rid of the pre-launchd XQuartzFixer startup item; it's
+ probably not there, but we might as well leave things as clean as we
+ can.
+
+ Change-Id: Icfdbe6c0d022cde8cf30bd3c79fbf77896e6fe98
+ Reviewed-on: https://code.wireshark.org/review/30322
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit e4e6beadb14ebee829a33725cd9e5f3622c05fc7)
+ Reviewed-on: https://code.wireshark.org/review/30324
+
+commit eea5f72c24
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Oct 21 14:35:21 2018 -0700
+
+ More permission fixes.
+
+ Take away group write permission for stuff under
+ /Library/Application Support/Wireshark. For some reason, it's getting
+ set; it's not necessary.
+
+ Change-Id: I4280a635e0c171cf5ad17cb91fe20d746c2daf79
+ Reviewed-on: https://code.wireshark.org/review/30317
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit af55deabbc8fd3fdcd2752dae3ce5b5dd60b6b0e)
+ Reviewed-on: https://code.wireshark.org/review/30319
+
+commit 9fd0afe48d
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Oct 21 11:51:57 2018 -0700
+
+ Get rid of a launchd daemon we no longer need.
+
+ Change-Id: Ic287d6d8a84876da10ca600ef3899b40c8f5663e
+ Reviewed-on: https://code.wireshark.org/review/30310
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 2d1ade6446be04b01218ede31088571d6d28f6a9)
+ Reviewed-on: https://code.wireshark.org/review/30312
+
+commit cfbbcee33c
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Oct 21 11:35:09 2018 -0700
+
+ Fix ownership and permissions on /Library/Application Support/Wireshark.
+
+ Bug: 14335
+ Change-Id: I657b024554e1eff01544b7726a7eec74c8da8be1
+ Reviewed-on: https://code.wireshark.org/review/30307
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit b51aafd77cd060a09bb01a2287a481ca43d1b95e)
+ Reviewed-on: https://code.wireshark.org/review/30309
+
+commit d101ece767
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Oct 21 11:29:09 2018 -0700
+
+ Don't give launchd daemon plists execute permission.
+
+ They don't need it; read permission suffices.
+
+ While we're at it, rename a variable to indicate that it's the path to
+ the plist for ChmodBPF, not the path to the executable for ChmodBPF.
+
+ Change-Id: Ib7537e26ae3f4477c4110759049a8cd7d2f09cf6
+ Reviewed-on: https://code.wireshark.org/review/30303
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit aed46e7eb1ac29704175eeeb6f8e69fb5b8a2e04)
+ Reviewed-on: https://code.wireshark.org/review/30305
+
+commit 9af5e21c00
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Oct 21 08:39:10 2018 +0000
+
+ [Automatic update for 2018-10-21]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ife601d65dc2824d66fcfb79b85eec2f9381ad83c
+ Reviewed-on: https://code.wireshark.org/review/30296
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 8ae6754db9
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Oct 20 01:56:59 2018 -0700
+
+ Include transport protocols' hfids in the list of wanted hfids.
+
+ We need to get the fields corresponding to those protocols, so we know
+ the range within the packet that those protocols cover.
+
+ Improve a debugging message while we're at it.
+
+ Bug: 15208
+ Change-Id: Idc329079584e8d035622b148503a2ec1a295ccaa
+ Reviewed-on: https://code.wireshark.org/review/30280
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 69b5325044dd3b2101cc09da7d0f979d0b907934)
+ Reviewed-on: https://code.wireshark.org/review/30282
+
+commit b352b299ac
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Oct 19 23:39:52 2018 -0700
+
+ Fix capitalization of preference display name.
+
+ They're supposed to use sentence case.
+
+ Change-Id: I28c5120fdfae14c628a2ffbfe6fc4b571f71767a
+ Reviewed-on: https://code.wireshark.org/review/30277
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 89d2b33b3870bf27149842f133ecf9748bdd1462)
+ Reviewed-on: https://code.wireshark.org/review/30279
+
+commit f03a3353bf
+Author: Gerald Combs <gerald.combs@riverbed.com>
+Date: Sun Oct 14 08:50:44 2018 +0000
+
+ [Automatic update for 2018-10-14]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I12bf3c7c1e2564c291b697cd2ca924841c169c69
+ Reviewed-on: https://code.wireshark.org/review/30203
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit c5a65115eb
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Oct 11 13:04:03 2018 +0200
+
+ DCOM: always NUL-terminate dissect_dcom_BSTR results
+
+ All of the six users in plugins/epan/profinet/packet-dcom-cba.c expect
+ the string to be NUL-terminated, so ensure this to avoid reading
+ uninitialized memory for the Info column.
+
+ Bug: 15130
+ Change-Id: Ibc922068d14b87ce324af3cec22a5f8343088b40
+ Reviewed-on: https://code.wireshark.org/review/30128
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit ec6ace066ae4c889d4c18a0a38a8c6053483877b)
+ Reviewed-on: https://code.wireshark.org/review/30159
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit cacb057d24
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Oct 11 12:14:00 2018 +0200
+
+ wmem_tree: fix crash with wmem_tree_destroy and NULL scope
+
+ The function was documented for use with a NULL scope, but it actually
+ crashes since callbacks are not available for NULL scopes. git master
+ is unaffected, but the GTK+ protocol dialog in 2.4 and 2.6 do crash.
+
+ Bug: 14349
+ Change-Id: I54350e112192394797cf85eaac4f30194178d7c4
+ Fixes: v2.3.0rc0-2597-gb7d6cca4ae ("Add wmem_tree_destroy")
+ Reviewed-on: https://code.wireshark.org/review/30126
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit f4be16aa45e76d862ff858e8c36e28a206be3143)
+ Reviewed-on: https://code.wireshark.org/review/30157
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit dc4d209f39
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Oct 11 00:02:26 2018 +0200
+
+ tvbuff_composite: fix buffer overflow due to wrong offset adjustment
+
+ The tvb_offset method should return the offset of the buffer within the
+ backing tvb (ds_tvb). The currently returned non-zero offset is valid
+ for tvbuff_subset.c, but not for the composite TVB. The backing tvb is
+ the tvb itself, so the offset should be zero (or "counter" for
+ consistency with tvbuff_real.c and others).
+
+ This bug is observable with the capture from the bug. In tshark, the
+ data field in the PDML output has value "field length invalid!" and the
+ position attribute ("pos") is too large. With the -V option it even
+ crashes with a buffer overflow (read). In the GUI, the bytes tab shows
+ range 3199-19642 even if the data source is only 16444 bytes while the
+ selection should have been 0-16443.
+
+ Bug: 14466
+ Change-Id: I01399ff500321dba262eb60b67c4cddb173b4679
+ Reviewed-on: https://code.wireshark.org/review/30124
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit ec5adb0ce98c37c8119feb972a5207e0e1721d9b)
+ Reviewed-on: https://code.wireshark.org/review/30153
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit 2d8a9ef49f
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Oct 12 00:30:44 2018 -0700
+
+ Also need a period at the end of the "Built using" clause.
+
+ Change-Id: Ia872e912f1331ef8d6b54b6751f5c132fbf0b4f3
+ Reviewed-on: https://code.wireshark.org/review/30148
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 4d3e7272739fa657376729409dfaba8a698efe4f)
+ Reviewed-on: https://code.wireshark.org/review/30150
+
+commit 69a62821fe
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Oct 12 00:23:13 2018 -0700
+
+ Need a space between the VS year number and the toolchain version.
+
+ Change-Id: I5e0047fde7a2d5a98767c6ed440b85575f711b9e
+ Reviewed-on: https://code.wireshark.org/review/30145
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 0ddc082b9f049532b50aa2351a2c1a88f65b763d)
+ Reviewed-on: https://code.wireshark.org/review/30147
+
+commit 0d4a0debbb
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Oct 11 22:12:29 2018 -0700
+
+ Clean up MSVC version string generation.
+
+ Don't bother with versions prior to VS 2010; as of Wireshark 2.4, we
+ don't support them.
+
+ Show it as "Visual Studio (year)", followed by the toolchain version
+ (not to be confused with the compiler version - or with the Visual
+ Studio version!).
+
+ Do the same thing for the clang/C2 compiler; just append the clang
+ version stuff after that.
+
+ Indent the #if/#elif/#else/#endif to make it a little clearer how
+ they're nested.
+
+ Change-Id: Ib7a3af3251e6375d267b3b5da9f8e26a377ceeac
+ Reviewed-on: https://code.wireshark.org/review/30138
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit f7596b82ab99cc83a24451f1c6e2ebb8af156478)
+ Reviewed-on: https://code.wireshark.org/review/30143
+
+commit dabea83d27
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Mar 20 00:31:57 2018 -0700
+
+ Handle Clang/C2.
+
+ Microsoft have a C/C++ compiler with a Clang front end and their code
+ generator:
+
+ https://blogs.msdn.microsoft.com/vcblog/tag/clang/
+
+ Try to detect it. (It's not too late.)
+
+ Change-Id: I574e3f985f376727df77081b429cad7f3d1f5d70
+ Reviewed-on: https://code.wireshark.org/review/26563
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 5f739fb83746d7a1cf68325db765b73f568526a1)
+ Reviewed-on: https://code.wireshark.org/review/30142
+
+commit 33b8acac26
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Thu Oct 11 16:37:24 2018 -0700
+
+ 2.4.10 → 2.4.11.
+
+ Change-Id: I60193fc6623e0ccade961f15cbc827ceffd1c48c
+ Reviewed-on: https://code.wireshark.org/review/30136
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
diff --git a/NEWS b/NEWS
index 9c54422625..7d4820a267 100644
--- a/NEWS
+++ b/NEWS
@@ -1,4 +1,4 @@
- Wireshark 2.4.10 Release Notes
+ Wireshark 2.4.11 Release Notes
__________________________________________________________________
What is Wireshark?
@@ -12,27 +12,39 @@ What's New
Bug Fixes
The following vulnerabilities have been fixed:
- * [1]wnpa-sec-2018-47
- MS-WSP dissector crash. [2]Bug 15119. [3]CVE-2018-18227.
- * [4]wnpa-sec-2018-50
- OpcUA dissector crash. [5]CVE-2018-12086.
+ * [1]wnpa-sec-2018-51 The Wireshark dissection engine could crash.
+ [2]Bug 14466. [3]CVE-2018-19625.
+ * [4]wnpa-sec-2018-52 The DCOM dissector could crash. [5]Bug 15130.
+ [6]CVE-2018-19626.
+ * [7]wnpa-sec-2018-53 The LBMPDM dissector could crash. [8]Bug 15132.
+ [9]CVE-2018-19623.
+ * [10]wnpa-sec-2018-54 The MMSE dissector could go into an infinite
+ loop. [11]Bug 15250. [12]CVE-2018-19622.
+ * [13]wnpa-sec-2018-55 The IxVeriWave file parser could crash.
+ [14]Bug 15279. [15]CVE-2018-19627.
+ * [16]wnpa-sec-2018-56 The PVFS dissector could crash. [17]Bug 15280.
+ [18]CVE-2018-19624.
The following bugs have been fixed:
- * HTTP2 dissector decodes first SSL record only. [6]Bug 11173.
- * Undocumented sub-option for -N option in man page and tshark -N
- help. [7]Bug 14826.
- * Mishandling of Port Control Protocol option padding. [8]Bug 14950.
- * MGCP: parameter lines are case-insensitive. [9]Bug 15008.
- * details of 2nd sub-VSA in bundled RADIUS VSA are incorrect. [10]Bug
- 15073.
- * Heuristic DPLAY dissector fails to recognize DPLAY packets. [11]Bug
- 15092.
- * gsm_rlcmac_dl dissector exception. [12]Bug 15112.
- * Buildbot crash output: fuzz-2018-09-07-29306.pcap. [13]Bug 15119.
- * Wildcard expansion doesn't work on Windows 10 for command-line
- programs in cmd.exe or PowerShell. [14]Bug 15151.
- * SSL Reassembly Error New fragment past old data limits. [15]Bug
- 15158.
+ * VoIP Calls dialog doesn't include RTP stream when preparing a
+ filter. [19]Bug 13440.
+ * Wireshark installs on macOS with permissions for
+ /Library/Application Support/Wireshark that are too restrictive.
+ [20]Bug 14335.
+ * Closing Enabled Protocols dialog crashes wireshark. [21]Bug 14349.
+ * Encrypted Alerts corresponds to a wrong selection in the packet
+ bytes pane. [22]Bug 14712.
+ * MATE unable to extract fields for PDU. [23]Bug 15208.
+ * Malformed Packet: SV. [24]Bug 15224.
+ * ISUP (ANSI) packets malformed in WS versions later than 2.4.8.
+ [25]Bug 15236.
+ * Handover candidate enquire message not decoded. [26]Bug 15237.
+ * MLE security suite display incorrect. [27]Bug 15288.
+ * Message for incorrect IPv4 option lengths is incorrect. [28]Bug
+ 15290.
+ * TACACS+ dissector does not properly reassemble large accounting
+ messages. [29]Bug 15293.
+ * NLRI of S-PMSI A-D BGP route not being displayed. [30]Bug 15307.
New and Updated Features
@@ -44,11 +56,12 @@ What's New
Updated Protocol Support
- ASN.1 PER, CIP, DPLAY, HTTP, MGCP, MS-WSP, OpcUa, PCP, RADIUS, and TLS
+ BGP, DCOM, GSM A BSSMAP, IEEE 802.11 Radiotap, ISUP, LBMPDM, LISP, MLE,
+ MMSE, PVFS, SLL, SSL/TLS, SV, and TACACS+
New and Updated Capture File Support
- Ascend, and pcapng
+ 3GPP TS 32.423 Trace, and IxVeriWave
New and Updated Capture Interfaces support
@@ -59,14 +72,14 @@ What's New
Getting Wireshark
Wireshark source code and installation packages are available from
- [16]https://www.wireshark.org/download.html.
+ [31]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
- found on the [17]download page on the Wireshark web site.
+ found on the [32]download page on the Wireshark web site.
__________________________________________________________________
File Locations
@@ -79,69 +92,84 @@ File Locations
Known Problems
- Dumpcap might not quit if Wireshark or TShark crashes. ([18]Bug 1419)
+ Dumpcap might not quit if Wireshark or TShark crashes. ([33]Bug 1419)
- The BER dissector might infinitely loop. ([19]Bug 1516)
+ The BER dissector might infinitely loop. ([34]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
- ([20]Bug 1814)
+ ([35]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
- ([21]Bug 2234)
+ ([36]Bug 2234)
- Application crash when changing real-time option. ([22]Bug 4035)
+ Application crash when changing real-time option. ([37]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
- ([23]Bug 4985)
+ ([38]Bug 4985)
- Wireshark should let you work with multiple capture files. ([24]Bug
+ Wireshark should let you work with multiple capture files. ([39]Bug
10488)
__________________________________________________________________
Getting Help
- Community support is available on [25]Wireshark's Q&A site and on the
+ Community support is available on [40]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [26]the web site.
+ all of Wireshark's mailing lists can be found on [41]the web site.
Official Wireshark training and certification are available from
- [27]Wireshark University.
+ [42]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [28]Wireshark web site.
+ A complete FAQ is available on the [43]Wireshark web site.
__________________________________________________________________
- Last updated 2018-10-11 18:04:58 UTC
+ Last updated 2018-11-28 18:01:42 UTC
References
- 1. https://www.wireshark.org/security/wnpa-sec-2018-47.html
- 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119
- 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18227
- 4. https://www.wireshark.org/security/wnpa-sec-2018-50.html
- 5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12086
- 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11173
- 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14826
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14950
- 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15008
- 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15073
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15092
- 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15112
- 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15151
- 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15158
- 16. https://www.wireshark.org/download.html
- 17. https://www.wireshark.org/download.html#thirdparty
- 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
- 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
- 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
- 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
- 25. https://ask.wireshark.org/
- 26. https://www.wireshark.org/lists/
- 27. http://www.wiresharktraining.com/
- 28. https://www.wireshark.org/faq.html
+ 1. https://www.wireshark.org/security/wnpa-sec-2018-51.html
+ 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
+ 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625
+ 4. https://www.wireshark.org/security/wnpa-sec-2018-52.html
+ 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
+ 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626
+ 7. https://www.wireshark.org/security/wnpa-sec-2018-53.html
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
+ 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623
+ 10. https://www.wireshark.org/security/wnpa-sec-2018-54.html
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
+ 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622
+ 13. https://www.wireshark.org/security/wnpa-sec-2018-55.html
+ 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
+ 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627
+ 16. https://www.wireshark.org/security/wnpa-sec-2018-56.html
+ 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
+ 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624
+ 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13440
+ 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14335
+ 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14349
+ 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14712
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15208
+ 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15224
+ 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15236
+ 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15237
+ 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15288
+ 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15290
+ 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15293
+ 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15307
+ 31. https://www.wireshark.org/download.html
+ 32. https://www.wireshark.org/download.html#thirdparty
+ 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
+ 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
+ 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
+ 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
+ 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 40. https://ask.wireshark.org/
+ 41. https://www.wireshark.org/lists/
+ 42. http://www.wiresharktraining.com/
+ 43. https://www.wireshark.org/faq.html
diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc
index 5389295ed9..705d6e64f8 100644
--- a/docbook/release-notes.asciidoc
+++ b/docbook/release-notes.asciidoc
@@ -16,48 +16,48 @@ The following vulnerabilities have been fixed:
* wssalink:2018-51[]
The Wireshark dissection engine could crash.
-//wsbuglink:14466[].
-//cveidlink:2018-xxxx[].
+wsbuglink:14466[].
+cveidlink:2018-19625[].
// Fixed in master: ec5adb0ce9
// Fixed in master-2.6: f489f8f2c4
// Fixed in master-2.4: dc4d209f39
* wssalink:2018-52[]
The DCOM dissector could crash.
-//wsbuglink:15130[].
-//cveidlink:2018-xxxx[].
+wsbuglink:15130[].
+cveidlink:2018-19626[].
// Fixed in master: ec6ace066a
// Fixed in master-2.6: 26c6460e3c
// Fixed in master-2.4: c5a65115eb
* wssalink:2018-53[]
The LBMPDM dissector could crash.
-//wsbuglink:15132[].
-//cveidlink:2018-xxxx[].
+wsbuglink:15132[].
+cveidlink:2018-19623[].
// Fixed in master: 5797f60274
// Fixed in master-2.6: 1ec5a933e1
// Fixed in master-2.4: 9c8645ec7b
* wssalink:2018-54[]
The MMSE dissector could go into an infinite loop.
-//wsbuglink:15250[].
-//cveidlink:2018-xxxx[].
+wsbuglink:15250[].
+cveidlink:2018-19622[].
// Fixed in master: 1ddaf1a094
// Fixed in master-2.6: 1dddeff985
// Fixed in master-2.4: 3b7555d32d
* wssalink:2018-55[]
The IxVeriWave file parser could crash.
-//wsbuglink:15279[].
-//cveidlink:2018-xxxx[].
+wsbuglink:15279[].
+cveidlink:2018-19627[].
// Fixed in master: 332df929a9
// Fixed in master-2.6: bdc33cfaec
// Fixed in master-2.4: d9b8b93f0e
* wssalink:2018-56[]
The PVFS dissector could crash.
-//wsbuglink:15280[].
-//cveidlink:2018-xxxx[].
+wsbuglink:15280[].
+cveidlink:2018-19624[].
// Fixed in master: a8c93de0b0
// Fixed in master-2.6: 457420a638
// Fixed in master-2.4: 3e319db110
@@ -94,8 +94,6 @@ The following bugs have been fixed:
* NLRI of S-PMSI A-D BGP route not being displayed. wsbuglink:15307[].
-// Left off at d9b8b93f0e
-
=== New and Updated Features
There are no new features in this release.
@@ -111,13 +109,29 @@ There are no new protocols in this release.
=== Updated Protocol Support
--sort-and-group--
+BGP
+DCOM
+GSM A BSSMAP
+IEEE 802.11 Radiotap
+ISUP
+LBMPDM
+LISP
+MLE
+MMSE
+PVFS
+SLL
+SSL/TLS
+SV
+TACACS+
--sort-and-group--
=== New and Updated Capture File Support
-There is no new or updated capture file support in this release.
-//--sort-and-group--
-//--sort-and-group--
+//There is no new or updated capture file support in this release.
+--sort-and-group--
+3GPP TS 32.423 Trace
+IxVeriWave
+--sort-and-group--
=== New and Updated Capture Interfaces support
diff --git a/version.conf b/version.conf
index b999997703..cc8d9d1108 100644
--- a/version.conf
+++ b/version.conf
@@ -1,9 +1,9 @@
# Interim releases: Enable packaging, add an "rc" to the version.
-enable: 1
-pkg_format: rc0-%#
-pkg_enable: 1
+#enable: 1
+#pkg_format: rc0-%#
+#pkg_enable: 1
# Final release: Disable package version stamps.
-#enable: 1
-#pkg_format:
-#pkg_enable: 0
+enable: 1
+pkg_format:
+pkg_enable: 0