diff options
author | Gerald Combs <gerald@wireshark.org> | 2018-11-28 09:35:22 -0800 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2018-11-28 18:14:12 +0000 |
commit | a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e (patch) | |
tree | df693cf382544b31283067f76d4b3b1a959b9ce4 | |
parent | b9dca4f2132cd668f811c1ee9102dca682a5d1e9 (diff) | |
download | wireshark-a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e.tar.gz wireshark-a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e.tar.bz2 wireshark-a6cc2066cf056baae5dbb3b354f2f1f9fd065f0e.zip |
Build 2.4.11.wireshark-2.4.11v2.4.11
Change-Id: I4a895239c73514b110ff66bee9afc76c5ba85d10
Reviewed-on: https://code.wireshark.org/review/30825
Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r-- | ChangeLog | 866 | ||||
-rw-r--r-- | NEWS | 156 | ||||
-rw-r--r-- | docbook/release-notes.asciidoc | 48 | ||||
-rw-r--r-- | version.conf | 12 |
4 files changed, 995 insertions, 87 deletions
@@ -0,0 +1,866 @@ +commit f2c88e4594 +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed Nov 28 09:35:22 2018 -0800 + + Build 2.4.11. + + Change-Id: I4a895239c73514b110ff66bee9afc76c5ba85d10 + +commit b9dca4f213 +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Nov 27 17:38:55 2018 -0800 + + Update the release notes for 2.4.11. + + Change-Id: Ibe75eb946b4a005edb8c5cb1d0269c3d36ce7aa2 + Reviewed-on: https://code.wireshark.org/review/30817 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit d9b8b93f0e +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Nov 27 13:38:10 2018 -0800 + + IxVeriWave: Fix a buffer boundary. + + Pass the correct buffer size to find_signature so that we don't read + past it. + + Bug: 15279 + Change-Id: I822ed0fe8b48196dadd9c0062ed53fa1c4f6f404 + Reviewed-on: https://code.wireshark.org/review/30809 + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Gerald Combs <gerald@wireshark.org> + (cherry picked from commit 332df929a9966fda2cd3aa30a5a107e5b2bfa360) + Reviewed-on: https://code.wireshark.org/review/30814 + +commit 3e319db110 +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Nov 27 12:23:31 2018 -0800 + + pvfs2: Add a pointer check. + + Make sure a pointer isn't NULL before trying to dereference it. + + Bug: 15280 + Change-Id: If2686940a0347154d9a59f5e2141511e7e1f49a4 + Reviewed-on: https://code.wireshark.org/review/30807 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit a8c93de0b0130ed5f4aab59338372783054898ea) + Reviewed-on: https://code.wireshark.org/review/30812 + +commit 37057d45a4 +Author: Jaap Keuter <jaap.keuter@xs4all.nl> +Date: Mon Nov 26 21:27:55 2018 +0100 + + BGP: Fix dissection of MCAST-VPN NLRI + + Due to a incorrect check the details of MCAST-VPN NLRI were + never dissected. Also the Originating Router's IP Addr of a + S-PMSI A-D Route was not dissected. + + Bug: 15307 + Change-Id: Ic7481ed034e4cbf0dcab4aa150f05da2f5aac508 + Signed-off-by: Jaap Keuter <jaap.keuter@xs4all.nl> + Reviewed-on: https://code.wireshark.org/review/30796 + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit f81083731888d0d17f5072652aa60e7d6d6c1067) + Reviewed-on: https://code.wireshark.org/review/30801 + +commit df57e134b9 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Nov 25 08:38:51 2018 +0000 + + [Automatic update for 2018-11-25] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Ia4c4fd305d7f4103cff22973ca117bddd18ea0e1 + Reviewed-on: https://code.wireshark.org/review/30787 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit ad5daa789b +Author: Erika Szelleova <szelleerika@gmail.com> +Date: Sat Jun 2 14:43:40 2018 +0200 + + VoIP: fix in prepare filter for VOIP calls + + Make sure that the filter for VoIP calls includes RTP streams when calling + Prepare filter. + + Bug: 13440 + Change-Id: Ia55073151817b88b3fa6a3fd30f98fdf683621a4 + Reviewed-on: https://code.wireshark.org/review/27955 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 555067724aec4667ea17ff6e514466b2547c9351) + Reviewed-on: https://code.wireshark.org/review/30780 + Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl> + +commit 0398d9af1c +Author: Jason Cohen <kryojenik2@gmail.com> +Date: Tue Nov 20 16:23:09 2018 -0600 + + Fix reassembly of larger TACACS+ accounting messages + + Since TACACS+ is TCP only, switched to tcp_dissect_pdus + + Bug: 15293 + Change-Id: I8cee8a1f474ae866c59f94ec8ecbd412e5189e89 + Reviewed-on: https://code.wireshark.org/review/30748 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + Reviewed-on: https://code.wireshark.org/review/30750 + +commit e8fedc7fb9 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Nov 20 10:26:39 2018 -0800 + + Fix expert info message for wrong option length. + + Bug: 15290 + Change-Id: Id5b4f6a899fea542f5d50e8be991d7cca623fd46 + Reviewed-on: https://code.wireshark.org/review/30744 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 8beab04229803af96a1143cfef6915719e319e58) + Reviewed-on: https://code.wireshark.org/review/30746 + +commit 584915a4d3 +Author: Robert Cragie <Robert.Cragie@arm.com> +Date: Mon Nov 19 13:53:43 2018 +0000 + + Fix MLE security suite display + + Security suite 0xff (no security) is displayed incorrectly as 0x7f. + + Bug: 15288 + Change-Id: Ic899ca724a4a958520e34d522c211e5c625d43ce + Reviewed-on: https://code.wireshark.org/review/30713 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + Reviewed-on: https://code.wireshark.org/review/30721 + Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl> + Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl> + +commit 4523e8bf17 +Author: Vasil Velichkov <vvvelichkov@gmail.com> +Date: Sun Nov 18 15:02:21 2018 +0200 + + .mailmap: fix duplicate entry + + Change-Id: I4498178e0eae3cec45514cb11185e906edffa7c4 + Reviewed-on: https://code.wireshark.org/review/30694 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + (cherry picked from commit 2294ac3dfe3e3bb1fd74bfa5cd5523fd45b22c1c) + (cherry picked from commit 065c9f26041ca5b3e46d233c8aef9df9dd6e997f) + Reviewed-on: https://code.wireshark.org/review/30699 + +commit 9e1f588c16 +Author: Lorand Jakab <ljakab@ac.upc.edu> +Date: Fri Nov 16 13:03:55 2018 +0100 + + LISP: Switch to proto_tree_add_subtree_format() + + When the LISP dissector was initially written, it followed a different + pattern for adding subtrees with a text label, which needs to be + modified while dissecting: proto_tree_add_item() + + proto_item_append_text() + proto_item_add_subtree(). + + This commit updates the code to use the more elegant + proto_tree_add_subtree_format() call. + + Change-Id: Icb6424be3c9cdecbfe9bb5aa2d39f3ad3d1499e0 + Signed-off-by: Lorand Jakab <ljakab@ac.upc.edu> + Reviewed-on: https://code.wireshark.org/review/30655 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-on: https://code.wireshark.org/review/30703 + +commit dfc2b2720a +Author: Eugene Adell <eugene.adell@gmail.com> +Date: Sun May 20 03:57:42 2018 -0700 + + SSL: Send the record_length to the dissect_ssl3_alert and use it + + Bug: 14712 + Change-Id: I3550f0da76a9acd3619d243b5a6e1d04d6734b62 + Reviewed-on: https://code.wireshark.org/review/27670 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit 9b92d825cba5c4d56698cccddfe1d6d570c95e87) + Reviewed-on: https://code.wireshark.org/review/30701 + +commit d10d3c9672 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Nov 18 08:42:42 2018 +0000 + + [Automatic update for 2018-11-18] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I22bfb5a21a8ece92794189c2e8c8d2adc42c3f08 + Reviewed-on: https://code.wireshark.org/review/30689 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 3b7555d32d +Author: Jeff Morriss <jeff.morriss.ws@gmail.com> +Date: Fri Nov 9 15:16:35 2018 -0500 + + MMSE: catch length overflows to avoid infinite loop. + + After fetching a length from the packet ensure those bytes exist to + avoid integer overflows by callers (while avoiding having to ensure + every caller checks for overflows). + + Also add a check to ensure the loop in question is progressing through + the TVB; report a dissector bug if it doesn't. + + Bug: 15250 + Bug: 15246 + Change-Id: I9434bfe9d530942fd45342690383df2decacdba1 + Reviewed-on: https://code.wireshark.org/review/30560 + Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 1ddaf1a0944ffe95d69717ac9fdc60824932f676) + Reviewed-on: https://code.wireshark.org/review/30673 + Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> + +commit eefec0916c +Author: Lorand Jakab <ljakab@ac.upc.edu> +Date: Wed Nov 14 17:27:37 2018 +0100 + + LISP: Fix action bits decoding + + Change-Id: I76f5e10fbc5ca0071d1444e31ce4c8fba639c3bc + Signed-off-by: Lorand Jakab <ljakab@ac.upc.edu> + Reviewed-on: https://code.wireshark.org/review/30630 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 6f3e7a6d80f55809560d7431a12bc2f3b0a480d7) + Reviewed-on: https://code.wireshark.org/review/30637 + +commit 46faaa5668 +Author: Anders Broman <anders.broman@ericsson.com> +Date: Wed Nov 14 14:24:22 2018 +0100 + + nettrace_3gpp_32_423: Don't crash on error and improve error output. + + Change-Id: I4ea7ccf51321d6ce316456bde24aa37880ea52ed + Reviewed-on: https://code.wireshark.org/review/30627 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit db7653fd2ce8542a8648dad0c8360c3eb82e6ec0) + Reviewed-on: https://code.wireshark.org/review/30635 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit ada54b8ea9 +Author: Dario Lombardo <lomato@gmail.com> +Date: Wed Nov 14 09:40:30 2018 +0100 + + ui: add missing break. + + Error: + ../ui/alert_box.c: In function ‘cfile_write_failure_alert_box’: + ../ui/alert_box.c:359:13: error: this statement may fall through [-Werror=implicit-fallthrough=] + simple_error_message_box( + ^~~~~~~~~~~~~~~~~~~~~~~~~ + "Frame %u%s has a network type that differs from the network type of earlier packets, which isn't supported in a \"%s\" file.", + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + framenum, in_file_string, + ~~~~~~~~~~~~~~~~~~~~~~~~~ + wtap_file_type_subtype_string(file_type_subtype)); + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + ../ui/alert_box.c:364:9: note: here + case WTAP_ERR_PACKET_TOO_LARGE: + ^~~~ + + Change-Id: I55464afff5625ae8c587470e417234560c7e606c + Reviewed-on: https://code.wireshark.org/review/30623 + Reviewed-by: Dario Lombardo <lomato@gmail.com> + Petri-Dish: Dario Lombardo <lomato@gmail.com> + Tested-by: Dario Lombardo <lomato@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit f3b82ffae752f59e22dee7506322e644ca2144d1) + Reviewed-on: https://code.wireshark.org/review/30625 + +commit 2713dcbd21 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Nov 13 19:38:12 2018 -0800 + + Catch attempts to write multiple encapsulation types if unsupported. + + If, in the process of opening the input file, we determine that it has + packets of more than one link-layer type, we can catch attempts to write + that file to a file of a format that doesn't support more than one + link-layer type at the time we try to open the output file. + + If, however, we don't discover that the file has more than one + link-layer type until we've already created the output file - for + example, if we have a pcapng file with a new IDB, with a different + link-layer type from previous IDBs, after packet blocks for the earlier + interfces - we can't catch that until we try to write the packet. + + Currently, that causes the packet's data to be written out as is, so the + output file claims it's of the file's link-layer type, causing programs + reading the file to misdissect the packet. + + Report WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED on the write attempt + instead, and have a nicer error message for + WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED on a write. + + Change-Id: Ic41f2e4367cfe5667eb30c88cc6d3bfe422462f6 + Reviewed-on: https://code.wireshark.org/review/30617 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 3aec5e1a2882a04aae33207750e9053d5f73174b) + Reviewed-on: https://code.wireshark.org/review/30619 + +commit 82c561482d +Author: Vasil Velichkov <vasko@vvelichkov2.dev.opencode.com> +Date: Wed Nov 7 21:33:41 2018 +0200 + + tshark: Print the packets' comments in the expert info + + Previously 'tshark -z expert' was failing with abort when a packet + contains a comment + + - Add a new comment parameter and update the tshark's manual page + - Add a new comment_level severity and change the default lavel to it. + - Add various 'tshark -z expert' tests + + Change-Id: I188317da5e00019b8f2b725f0fe84942f774520f + Reviewed-on: https://code.wireshark.org/review/30610 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit ec95ae98ed29190f3df044e8676d6aed101405c0) + Reviewed-on: https://code.wireshark.org/review/30612 + +commit beadcb2c87 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Tue Nov 13 12:40:45 2018 +0100 + + extcap: Allow ASCII '0' in preference name + + Update the regex to also allow '0' in the preference name. + + Change-Id: I881079b579b9193dd31dda2150d9a50c000c0dd3 + Reviewed-on: https://code.wireshark.org/review/30602 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit b2c244e92d625d1e312b3b205b87a74850cc5f1f) + Reviewed-on: https://code.wireshark.org/review/30607 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 27bd37d8d090db880c6afb4242f902417cb970dd) + Reviewed-on: https://code.wireshark.org/review/30608 + +commit aa1ec78985 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Nov 12 22:17:49 2018 -0800 + + Move the Linux ARPHRD_ types to epan/arptypes.h. + + Change-Id: I6fa9593af64e8af1ade4f049ea949989adfd00c7 + Reviewed-on: https://code.wireshark.org/review/30595 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 88e98d876ec8e85db330654f7203805dd642a1a3) + Reviewed-on: https://code.wireshark.org/review/30597 + +commit 1bbf3b23e1 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Nov 12 19:38:12 2018 -0800 + + Fix dissection of 802.11+radiotap frames in Linux "cooked" captures. + + Those frames *don't* have their link-layer headers stripped, even on + PF_PACKET/SOCK_DGRAM captures (hopefully, nobody will consider that a + bug and "fix" it). + + The "hatype" field is the ARPHRD_ value for the adapter, as returned by + SIOCGIFHWADDR; in monitor mode, those frames will have an hatype of + ARPHRD_IEEE80211_RADIOTAP. Add an "sll.hatype" dissector table, which + we check before checking the "sll.ltype" dissector table, and have the + radiotap dissector register in that table. + + We still use the special hack for an hatype of ARPHRD_NETLINK, because, + for *those* frames, the "protocol" field of the nominal SLL header is + the netlink family, not an Ethertype or anything else that the SLL + dissector would handle. + + Change-Id: If503a7daa9133adf1b8c330ec28c4c824d4f551d + Reviewed-on: https://code.wireshark.org/review/30592 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit c348dd4b106621f85079ebaf8202229c689ea93b) + Reviewed-on: https://code.wireshark.org/review/30594 + +commit da15e7564e +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Nov 11 08:41:13 2018 +0000 + + [Automatic update for 2018-11-11] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Id6744be0a2f87d55a68eca6e09da5c5efc749ea9 + Reviewed-on: https://code.wireshark.org/review/30575 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 7ad23870b0 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Nov 4 08:45:29 2018 +0000 + + [Automatic update for 2018-11-04] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Icf63148a64d0b0c458e088237cc6e2e84d3a97ba + Reviewed-on: https://code.wireshark.org/review/30501 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit d5e8fb0146 +Author: Roland Knall <rknall@gmail.com> +Date: Tue Oct 30 13:10:21 2018 +0100 + + macos: Prevent darkmode from appearing + + Prevent dark mode from being used on newer versions of mac os x, as long as + Qt does not allow proper dark mode handling + + Change-Id: Ifee14ec690331689b0a8a7486829dd129a2687b4 + Reviewed-on: https://code.wireshark.org/review/30425 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + Petri-Dish: Roland Knall <rknall@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Roland Knall <rknall@gmail.com> + (cherry picked from commit 81c4f74a1921e8c89fcf200beb6892b78a7297d9) + Reviewed-on: https://code.wireshark.org/review/30438 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit c9ca0db048 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Oct 28 08:46:44 2018 +0000 + + [Automatic update for 2018-10-28] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I0995a518562277493a0418f76f3a7b61cf581d3b + Reviewed-on: https://code.wireshark.org/review/30400 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 0acd23dd64 +Author: Uli Heilmeier <uh@heilmeier.eu> +Date: Thu Oct 25 11:11:10 2018 +0200 + + SV: Fix handling data length + + Read not more data than protocol length defines. + + Bug: 15224 + Change-Id: I90e003c231fe75686065f8c44f70b5bb1df472c9 + Reviewed-on: https://code.wireshark.org/review/30377 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + Reviewed-on: https://code.wireshark.org/review/30383 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit eb4a038600 +Author: Uli Heilmeier <uh@heilmeier.eu> +Date: Wed Oct 24 16:00:27 2018 +0200 + + ISUP: fix offset for Generic name + + Adding the name to the tree at the same offset (1) where we read it. + + Bug: 15236 + Change-Id: Iefe1a74d7f4d547a049e0b82dca51964e48fa9b7 + Reviewed-on: https://code.wireshark.org/review/30370 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit b6598d5ec3358d5f3b91dcde7ee36c5ea045459e) + Reviewed-on: https://code.wireshark.org/review/30374 + +commit 7c90937c52 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Wed Oct 24 12:02:15 2018 +0200 + + GSM A BSSMAP: fix Number Of MSs IE dissection + + This IE is of TV type, not TLV type, so there is no length check to + perform. + + Bug: 15237 + Change-Id: Iafee6e43984d70cd046452687518b9cad5d30957 + Reviewed-on: https://code.wireshark.org/review/30364 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-on: https://code.wireshark.org/review/30368 + +commit 9c8645ec7b +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sun Oct 21 15:10:57 2018 +0200 + + LBMPDM: fix heap-buffer-overflow (write) in dissect_segment_ofstable + + id_list and ofs_list contain offsets read directly from the packet. + While the field type is FT_UINT32, it is somehow interpreted as signed + number. This means that ofs_table->offset_list[id_list[idx]]=... could + in fact result in an arbitrary write before "ofs_table->offset_list" due + to id_list[idx] being negative. + + Another way for id_list[idx] to remain negative (-1) is for the loop to + terminate before all "field_count" elements are set. Thus, remove the + "datalen_remaining >= L_LBMPDM_OFFSET_ENTRY_T" check, if the offset is + invalid the proto_tree_add_item accessors will throw an exception. + + Fixes the crash in the linked bug. Regression tested against the 8 + capture files from bug 9718, its dissection results are still the same. + + Bug: 15132 + Change-Id: If5d2f11ee47578acb80bc43ba7ed16adb27e0c02 + Fixes: v1.11.3-rc1-2270-g2f4ca9c8d9 ("Initial checkin of LBM aka 29West dissectors. See Bug 9718.") + Reviewed-on: https://code.wireshark.org/review/30300 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 5797f602741a7505c18c2e0c505e963ca3349153) + Reviewed-on: https://code.wireshark.org/review/30347 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit 75e153fc31 +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Oct 22 02:07:09 2018 -0700 + + No need for the debugging output. + + The chmods seem to be working. + + Change-Id: I0f85a1428de511497597a3fd304c700ea1a1f846 + Reviewed-on: https://code.wireshark.org/review/30331 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 433268130015f7faab0c964e484df29ad1628d43) + Reviewed-on: https://code.wireshark.org/review/30333 + +commit 6df201589b +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Oct 22 00:35:29 2018 -0700 + + Fix quoting. + + Change-Id: I3a0a8c661b1fec2ea4475eb9fe1d5c8a8ed7bbb5 + Reviewed-on: https://code.wireshark.org/review/30328 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 714c5dc2ab4075dd03e1df972b8e52f6eca9831f) + Reviewed-on: https://code.wireshark.org/review/30330 + +commit 34d4ba0920 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Oct 21 23:30:58 2018 -0700 + + Make the chmod verbose. + + For some reason it's *not* taking away write permission; make it verbose + to try to debug that. + + Change-Id: I180309953d36798d2da3a74959cdd934adc5a4a3 + Reviewed-on: https://code.wireshark.org/review/30325 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit a2514faf1dfcae8bef37c1e30a7a3dc4858f0332) + Reviewed-on: https://code.wireshark.org/review/30327 + +commit 3d74b489f6 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Oct 21 23:27:47 2018 -0700 + + Don't unload the XQuartzFixer job if it doesn't exist. + + But *do* get rid of the pre-launchd XQuartzFixer startup item; it's + probably not there, but we might as well leave things as clean as we + can. + + Change-Id: Icfdbe6c0d022cde8cf30bd3c79fbf77896e6fe98 + Reviewed-on: https://code.wireshark.org/review/30322 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e4e6beadb14ebee829a33725cd9e5f3622c05fc7) + Reviewed-on: https://code.wireshark.org/review/30324 + +commit eea5f72c24 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Oct 21 14:35:21 2018 -0700 + + More permission fixes. + + Take away group write permission for stuff under + /Library/Application Support/Wireshark. For some reason, it's getting + set; it's not necessary. + + Change-Id: I4280a635e0c171cf5ad17cb91fe20d746c2daf79 + Reviewed-on: https://code.wireshark.org/review/30317 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit af55deabbc8fd3fdcd2752dae3ce5b5dd60b6b0e) + Reviewed-on: https://code.wireshark.org/review/30319 + +commit 9fd0afe48d +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Oct 21 11:51:57 2018 -0700 + + Get rid of a launchd daemon we no longer need. + + Change-Id: Ic287d6d8a84876da10ca600ef3899b40c8f5663e + Reviewed-on: https://code.wireshark.org/review/30310 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 2d1ade6446be04b01218ede31088571d6d28f6a9) + Reviewed-on: https://code.wireshark.org/review/30312 + +commit cfbbcee33c +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Oct 21 11:35:09 2018 -0700 + + Fix ownership and permissions on /Library/Application Support/Wireshark. + + Bug: 14335 + Change-Id: I657b024554e1eff01544b7726a7eec74c8da8be1 + Reviewed-on: https://code.wireshark.org/review/30307 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit b51aafd77cd060a09bb01a2287a481ca43d1b95e) + Reviewed-on: https://code.wireshark.org/review/30309 + +commit d101ece767 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Oct 21 11:29:09 2018 -0700 + + Don't give launchd daemon plists execute permission. + + They don't need it; read permission suffices. + + While we're at it, rename a variable to indicate that it's the path to + the plist for ChmodBPF, not the path to the executable for ChmodBPF. + + Change-Id: Ib7537e26ae3f4477c4110759049a8cd7d2f09cf6 + Reviewed-on: https://code.wireshark.org/review/30303 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit aed46e7eb1ac29704175eeeb6f8e69fb5b8a2e04) + Reviewed-on: https://code.wireshark.org/review/30305 + +commit 9af5e21c00 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Oct 21 08:39:10 2018 +0000 + + [Automatic update for 2018-10-21] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Ife601d65dc2824d66fcfb79b85eec2f9381ad83c + Reviewed-on: https://code.wireshark.org/review/30296 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 8ae6754db9 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat Oct 20 01:56:59 2018 -0700 + + Include transport protocols' hfids in the list of wanted hfids. + + We need to get the fields corresponding to those protocols, so we know + the range within the packet that those protocols cover. + + Improve a debugging message while we're at it. + + Bug: 15208 + Change-Id: Idc329079584e8d035622b148503a2ec1a295ccaa + Reviewed-on: https://code.wireshark.org/review/30280 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 69b5325044dd3b2101cc09da7d0f979d0b907934) + Reviewed-on: https://code.wireshark.org/review/30282 + +commit b352b299ac +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 19 23:39:52 2018 -0700 + + Fix capitalization of preference display name. + + They're supposed to use sentence case. + + Change-Id: I28c5120fdfae14c628a2ffbfe6fc4b571f71767a + Reviewed-on: https://code.wireshark.org/review/30277 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 89d2b33b3870bf27149842f133ecf9748bdd1462) + Reviewed-on: https://code.wireshark.org/review/30279 + +commit f03a3353bf +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Oct 14 08:50:44 2018 +0000 + + [Automatic update for 2018-10-14] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I12bf3c7c1e2564c291b697cd2ca924841c169c69 + Reviewed-on: https://code.wireshark.org/review/30203 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit c5a65115eb +Author: Peter Wu <peter@lekensteyn.nl> +Date: Thu Oct 11 13:04:03 2018 +0200 + + DCOM: always NUL-terminate dissect_dcom_BSTR results + + All of the six users in plugins/epan/profinet/packet-dcom-cba.c expect + the string to be NUL-terminated, so ensure this to avoid reading + uninitialized memory for the Info column. + + Bug: 15130 + Change-Id: Ibc922068d14b87ce324af3cec22a5f8343088b40 + Reviewed-on: https://code.wireshark.org/review/30128 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit ec6ace066ae4c889d4c18a0a38a8c6053483877b) + Reviewed-on: https://code.wireshark.org/review/30159 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit cacb057d24 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Thu Oct 11 12:14:00 2018 +0200 + + wmem_tree: fix crash with wmem_tree_destroy and NULL scope + + The function was documented for use with a NULL scope, but it actually + crashes since callbacks are not available for NULL scopes. git master + is unaffected, but the GTK+ protocol dialog in 2.4 and 2.6 do crash. + + Bug: 14349 + Change-Id: I54350e112192394797cf85eaac4f30194178d7c4 + Fixes: v2.3.0rc0-2597-gb7d6cca4ae ("Add wmem_tree_destroy") + Reviewed-on: https://code.wireshark.org/review/30126 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit f4be16aa45e76d862ff858e8c36e28a206be3143) + Reviewed-on: https://code.wireshark.org/review/30157 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit dc4d209f39 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Thu Oct 11 00:02:26 2018 +0200 + + tvbuff_composite: fix buffer overflow due to wrong offset adjustment + + The tvb_offset method should return the offset of the buffer within the + backing tvb (ds_tvb). The currently returned non-zero offset is valid + for tvbuff_subset.c, but not for the composite TVB. The backing tvb is + the tvb itself, so the offset should be zero (or "counter" for + consistency with tvbuff_real.c and others). + + This bug is observable with the capture from the bug. In tshark, the + data field in the PDML output has value "field length invalid!" and the + position attribute ("pos") is too large. With the -V option it even + crashes with a buffer overflow (read). In the GUI, the bytes tab shows + range 3199-19642 even if the data source is only 16444 bytes while the + selection should have been 0-16443. + + Bug: 14466 + Change-Id: I01399ff500321dba262eb60b67c4cddb173b4679 + Reviewed-on: https://code.wireshark.org/review/30124 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit ec5adb0ce98c37c8119feb972a5207e0e1721d9b) + Reviewed-on: https://code.wireshark.org/review/30153 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit 2d8a9ef49f +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 12 00:30:44 2018 -0700 + + Also need a period at the end of the "Built using" clause. + + Change-Id: Ia872e912f1331ef8d6b54b6751f5c132fbf0b4f3 + Reviewed-on: https://code.wireshark.org/review/30148 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 4d3e7272739fa657376729409dfaba8a698efe4f) + Reviewed-on: https://code.wireshark.org/review/30150 + +commit 69a62821fe +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 12 00:23:13 2018 -0700 + + Need a space between the VS year number and the toolchain version. + + Change-Id: I5e0047fde7a2d5a98767c6ed440b85575f711b9e + Reviewed-on: https://code.wireshark.org/review/30145 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 0ddc082b9f049532b50aa2351a2c1a88f65b763d) + Reviewed-on: https://code.wireshark.org/review/30147 + +commit 0d4a0debbb +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu Oct 11 22:12:29 2018 -0700 + + Clean up MSVC version string generation. + + Don't bother with versions prior to VS 2010; as of Wireshark 2.4, we + don't support them. + + Show it as "Visual Studio (year)", followed by the toolchain version + (not to be confused with the compiler version - or with the Visual + Studio version!). + + Do the same thing for the clang/C2 compiler; just append the clang + version stuff after that. + + Indent the #if/#elif/#else/#endif to make it a little clearer how + they're nested. + + Change-Id: Ib7a3af3251e6375d267b3b5da9f8e26a377ceeac + Reviewed-on: https://code.wireshark.org/review/30138 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit f7596b82ab99cc83a24451f1c6e2ebb8af156478) + Reviewed-on: https://code.wireshark.org/review/30143 + +commit dabea83d27 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Mar 20 00:31:57 2018 -0700 + + Handle Clang/C2. + + Microsoft have a C/C++ compiler with a Clang front end and their code + generator: + + https://blogs.msdn.microsoft.com/vcblog/tag/clang/ + + Try to detect it. (It's not too late.) + + Change-Id: I574e3f985f376727df77081b429cad7f3d1f5d70 + Reviewed-on: https://code.wireshark.org/review/26563 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 5f739fb83746d7a1cf68325db765b73f568526a1) + Reviewed-on: https://code.wireshark.org/review/30142 + +commit 33b8acac26 +Author: Gerald Combs <gerald@wireshark.org> +Date: Thu Oct 11 16:37:24 2018 -0700 + + 2.4.10 → 2.4.11. + + Change-Id: I60193fc6623e0ccade961f15cbc827ceffd1c48c + Reviewed-on: https://code.wireshark.org/review/30136 + Reviewed-by: Gerald Combs <gerald@wireshark.org> @@ -1,4 +1,4 @@ - Wireshark 2.4.10 Release Notes + Wireshark 2.4.11 Release Notes __________________________________________________________________ What is Wireshark? @@ -12,27 +12,39 @@ What's New Bug Fixes The following vulnerabilities have been fixed: - * [1]wnpa-sec-2018-47 - MS-WSP dissector crash. [2]Bug 15119. [3]CVE-2018-18227. - * [4]wnpa-sec-2018-50 - OpcUA dissector crash. [5]CVE-2018-12086. + * [1]wnpa-sec-2018-51 The Wireshark dissection engine could crash. + [2]Bug 14466. [3]CVE-2018-19625. + * [4]wnpa-sec-2018-52 The DCOM dissector could crash. [5]Bug 15130. + [6]CVE-2018-19626. + * [7]wnpa-sec-2018-53 The LBMPDM dissector could crash. [8]Bug 15132. + [9]CVE-2018-19623. + * [10]wnpa-sec-2018-54 The MMSE dissector could go into an infinite + loop. [11]Bug 15250. [12]CVE-2018-19622. + * [13]wnpa-sec-2018-55 The IxVeriWave file parser could crash. + [14]Bug 15279. [15]CVE-2018-19627. + * [16]wnpa-sec-2018-56 The PVFS dissector could crash. [17]Bug 15280. + [18]CVE-2018-19624. The following bugs have been fixed: - * HTTP2 dissector decodes first SSL record only. [6]Bug 11173. - * Undocumented sub-option for -N option in man page and tshark -N - help. [7]Bug 14826. - * Mishandling of Port Control Protocol option padding. [8]Bug 14950. - * MGCP: parameter lines are case-insensitive. [9]Bug 15008. - * details of 2nd sub-VSA in bundled RADIUS VSA are incorrect. [10]Bug - 15073. - * Heuristic DPLAY dissector fails to recognize DPLAY packets. [11]Bug - 15092. - * gsm_rlcmac_dl dissector exception. [12]Bug 15112. - * Buildbot crash output: fuzz-2018-09-07-29306.pcap. [13]Bug 15119. - * Wildcard expansion doesn't work on Windows 10 for command-line - programs in cmd.exe or PowerShell. [14]Bug 15151. - * SSL Reassembly Error New fragment past old data limits. [15]Bug - 15158. + * VoIP Calls dialog doesn't include RTP stream when preparing a + filter. [19]Bug 13440. + * Wireshark installs on macOS with permissions for + /Library/Application Support/Wireshark that are too restrictive. + [20]Bug 14335. + * Closing Enabled Protocols dialog crashes wireshark. [21]Bug 14349. + * Encrypted Alerts corresponds to a wrong selection in the packet + bytes pane. [22]Bug 14712. + * MATE unable to extract fields for PDU. [23]Bug 15208. + * Malformed Packet: SV. [24]Bug 15224. + * ISUP (ANSI) packets malformed in WS versions later than 2.4.8. + [25]Bug 15236. + * Handover candidate enquire message not decoded. [26]Bug 15237. + * MLE security suite display incorrect. [27]Bug 15288. + * Message for incorrect IPv4 option lengths is incorrect. [28]Bug + 15290. + * TACACS+ dissector does not properly reassemble large accounting + messages. [29]Bug 15293. + * NLRI of S-PMSI A-D BGP route not being displayed. [30]Bug 15307. New and Updated Features @@ -44,11 +56,12 @@ What's New Updated Protocol Support - ASN.1 PER, CIP, DPLAY, HTTP, MGCP, MS-WSP, OpcUa, PCP, RADIUS, and TLS + BGP, DCOM, GSM A BSSMAP, IEEE 802.11 Radiotap, ISUP, LBMPDM, LISP, MLE, + MMSE, PVFS, SLL, SSL/TLS, SV, and TACACS+ New and Updated Capture File Support - Ascend, and pcapng + 3GPP TS 32.423 Trace, and IxVeriWave New and Updated Capture Interfaces support @@ -59,14 +72,14 @@ What's New Getting Wireshark Wireshark source code and installation packages are available from - [16]https://www.wireshark.org/download.html. + [31]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be - found on the [17]download page on the Wireshark web site. + found on the [32]download page on the Wireshark web site. __________________________________________________________________ File Locations @@ -79,69 +92,84 @@ File Locations Known Problems - Dumpcap might not quit if Wireshark or TShark crashes. ([18]Bug 1419) + Dumpcap might not quit if Wireshark or TShark crashes. ([33]Bug 1419) - The BER dissector might infinitely loop. ([19]Bug 1516) + The BER dissector might infinitely loop. ([34]Bug 1516) Capture filters aren't applied when capturing from named pipes. - ([20]Bug 1814) + ([35]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. - ([21]Bug 2234) + ([36]Bug 2234) - Application crash when changing real-time option. ([22]Bug 4035) + Application crash when changing real-time option. ([37]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. - ([23]Bug 4985) + ([38]Bug 4985) - Wireshark should let you work with multiple capture files. ([24]Bug + Wireshark should let you work with multiple capture files. ([39]Bug 10488) __________________________________________________________________ Getting Help - Community support is available on [25]Wireshark's Q&A site and on the + Community support is available on [40]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for - all of Wireshark's mailing lists can be found on [26]the web site. + all of Wireshark's mailing lists can be found on [41]the web site. Official Wireshark training and certification are available from - [27]Wireshark University. + [42]Wireshark University. __________________________________________________________________ Frequently Asked Questions - A complete FAQ is available on the [28]Wireshark web site. + A complete FAQ is available on the [43]Wireshark web site. __________________________________________________________________ - Last updated 2018-10-11 18:04:58 UTC + Last updated 2018-11-28 18:01:42 UTC References - 1. https://www.wireshark.org/security/wnpa-sec-2018-47.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119 - 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18227 - 4. https://www.wireshark.org/security/wnpa-sec-2018-50.html - 5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12086 - 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11173 - 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14826 - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14950 - 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15008 - 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15073 - 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15092 - 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15112 - 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119 - 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15151 - 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15158 - 16. https://www.wireshark.org/download.html - 17. https://www.wireshark.org/download.html#thirdparty - 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 - 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 - 25. https://ask.wireshark.org/ - 26. https://www.wireshark.org/lists/ - 27. http://www.wiresharktraining.com/ - 28. https://www.wireshark.org/faq.html + 1. https://www.wireshark.org/security/wnpa-sec-2018-51.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466 + 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625 + 4. https://www.wireshark.org/security/wnpa-sec-2018-52.html + 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130 + 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626 + 7. https://www.wireshark.org/security/wnpa-sec-2018-53.html + 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132 + 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623 + 10. https://www.wireshark.org/security/wnpa-sec-2018-54.html + 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250 + 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622 + 13. https://www.wireshark.org/security/wnpa-sec-2018-55.html + 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279 + 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627 + 16. https://www.wireshark.org/security/wnpa-sec-2018-56.html + 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280 + 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624 + 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13440 + 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14335 + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14349 + 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14712 + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15208 + 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15224 + 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15236 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15237 + 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15288 + 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15290 + 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15293 + 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15307 + 31. https://www.wireshark.org/download.html + 32. https://www.wireshark.org/download.html#thirdparty + 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 + 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 + 40. https://ask.wireshark.org/ + 41. https://www.wireshark.org/lists/ + 42. http://www.wiresharktraining.com/ + 43. https://www.wireshark.org/faq.html diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc index 5389295ed9..705d6e64f8 100644 --- a/docbook/release-notes.asciidoc +++ b/docbook/release-notes.asciidoc @@ -16,48 +16,48 @@ The following vulnerabilities have been fixed: * wssalink:2018-51[] The Wireshark dissection engine could crash. -//wsbuglink:14466[]. -//cveidlink:2018-xxxx[]. +wsbuglink:14466[]. +cveidlink:2018-19625[]. // Fixed in master: ec5adb0ce9 // Fixed in master-2.6: f489f8f2c4 // Fixed in master-2.4: dc4d209f39 * wssalink:2018-52[] The DCOM dissector could crash. -//wsbuglink:15130[]. -//cveidlink:2018-xxxx[]. +wsbuglink:15130[]. +cveidlink:2018-19626[]. // Fixed in master: ec6ace066a // Fixed in master-2.6: 26c6460e3c // Fixed in master-2.4: c5a65115eb * wssalink:2018-53[] The LBMPDM dissector could crash. -//wsbuglink:15132[]. -//cveidlink:2018-xxxx[]. +wsbuglink:15132[]. +cveidlink:2018-19623[]. // Fixed in master: 5797f60274 // Fixed in master-2.6: 1ec5a933e1 // Fixed in master-2.4: 9c8645ec7b * wssalink:2018-54[] The MMSE dissector could go into an infinite loop. -//wsbuglink:15250[]. -//cveidlink:2018-xxxx[]. +wsbuglink:15250[]. +cveidlink:2018-19622[]. // Fixed in master: 1ddaf1a094 // Fixed in master-2.6: 1dddeff985 // Fixed in master-2.4: 3b7555d32d * wssalink:2018-55[] The IxVeriWave file parser could crash. -//wsbuglink:15279[]. -//cveidlink:2018-xxxx[]. +wsbuglink:15279[]. +cveidlink:2018-19627[]. // Fixed in master: 332df929a9 // Fixed in master-2.6: bdc33cfaec // Fixed in master-2.4: d9b8b93f0e * wssalink:2018-56[] The PVFS dissector could crash. -//wsbuglink:15280[]. -//cveidlink:2018-xxxx[]. +wsbuglink:15280[]. +cveidlink:2018-19624[]. // Fixed in master: a8c93de0b0 // Fixed in master-2.6: 457420a638 // Fixed in master-2.4: 3e319db110 @@ -94,8 +94,6 @@ The following bugs have been fixed: * NLRI of S-PMSI A-D BGP route not being displayed. wsbuglink:15307[]. -// Left off at d9b8b93f0e - === New and Updated Features There are no new features in this release. @@ -111,13 +109,29 @@ There are no new protocols in this release. === Updated Protocol Support --sort-and-group-- +BGP +DCOM +GSM A BSSMAP +IEEE 802.11 Radiotap +ISUP +LBMPDM +LISP +MLE +MMSE +PVFS +SLL +SSL/TLS +SV +TACACS+ --sort-and-group-- === New and Updated Capture File Support -There is no new or updated capture file support in this release. -//--sort-and-group-- -//--sort-and-group-- +//There is no new or updated capture file support in this release. +--sort-and-group-- +3GPP TS 32.423 Trace +IxVeriWave +--sort-and-group-- === New and Updated Capture Interfaces support diff --git a/version.conf b/version.conf index b999997703..cc8d9d1108 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add an "rc" to the version. -enable: 1 -pkg_format: rc0-%# -pkg_enable: 1 +#enable: 1 +#pkg_format: rc0-%# +#pkg_enable: 1 # Final release: Disable package version stamps. -#enable: 1 -#pkg_format: -#pkg_enable: 0 +enable: 1 +pkg_format: +pkg_enable: 0 |