diff options
author | Gerald Combs <gerald@wireshark.org> | 2017-11-30 08:37:58 -0800 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2017-11-30 19:26:42 +0000 |
commit | 368ba1ee37837d82f30b93a779493abccd15a484 (patch) | |
tree | 51975392908c1639ddeced835a2420e9a3469cf5 | |
parent | 1166734b35c384f8ffedc7937e77af3bbffa9bc6 (diff) | |
download | wireshark-2.4.3.tar.gz wireshark-2.4.3.tar.bz2 wireshark-2.4.3.zip |
Build 2.4.3.wireshark-2.4.3v2.4.3
Change-Id: I32b7a6e4e4409981445409f6abc83f526b2aacdc
Reviewed-on: https://code.wireshark.org/review/24666
Reviewed-by: Gerald Combs <gerald@wireshark.org>
-rw-r--r-- | ChangeLog | 1427 | ||||
-rw-r--r-- | NEWS | 217 | ||||
-rw-r--r-- | docbook/release-notes.asciidoc | 25 | ||||
-rw-r--r-- | version.conf | 12 |
4 files changed, 1557 insertions, 124 deletions
@@ -0,0 +1,1427 @@ +commit 5ee0386ce4 +Author: Gerald Combs <gerald@wireshark.org> +Date: Thu Nov 30 08:37:58 2017 -0800 + + Build 2.4.3. + + Change-Id: I32b7a6e4e4409981445409f6abc83f526b2aacdc + +commit 1166734b35 +Author: Michael Mann <mmann78@netscape.net> +Date: Wed Nov 29 20:03:22 2017 -0500 + + CIP Safety: base packet length can be used + + Slight adjustment to I394fa91a5cfa1700fb12441d4884c0367b39df8b + + Change-Id: Id097a39265f49a79f3d39855ef6b5c95ffe8c4f1 + Reviewed-on: https://code.wireshark.org/review/24654 + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 3d6da018e7969c23b172b37a9f556696783ca9b1) + Reviewed-on: https://code.wireshark.org/review/24656 + +commit 87b6ea2237 +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed Nov 29 14:46:10 2017 -0800 + + NetBIOS: Don't write past the beginning of a buffer. + + Make sure process_netbios_name doesn't write past the beginning of its + buffer. + + Bug: 14249 + Change-Id: Idb294ba2362e48b879bc4c0c0ddaf64fcf1b5d72 + Reviewed-on: https://code.wireshark.org/review/24651 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit b59dc97dfef3bcce71cd393f4d2493e7ba1a8f82) + Reviewed-on: https://code.wireshark.org/review/24652 + Petri-Dish: Michael Mann <mmann78@netscape.net> + +commit ec6972193c +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Tue Nov 28 22:08:18 2017 +0100 + + CIP Safety: check packet length before dissecting + + Otherwise we can call CRC functions with a negative value, leading to + a segmentation fault. + + Bug: 14250 + Change-Id: I394fa91a5cfa1700fb12441d4884c0367b39df8b + Reviewed-on: https://code.wireshark.org/review/24621 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 041e3e7c27c78308d0d515171f52a39f8260782b) + Reviewed-on: https://code.wireshark.org/review/24642 + +commit 9ca7a6db04 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Nov 28 17:28:55 2017 -0800 + + Use a separate Boolean to indicate whether we have a duration. + + Reserved values are a bit of a hack. (If this were Swift....) + + Change-Id: I243e8f497345f44d94af6106287556b8831fba92 + Reviewed-on: https://code.wireshark.org/review/24633 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e74800d3479a937692114aa026522ff4768d9ad2) + Reviewed-on: https://code.wireshark.org/review/24634 + +commit 5b3bdbba64 +Author: Simon Barber <simon.barber@meraki.net> +Date: Tue Sep 12 15:35:47 2017 -0700 + + wireless-timeline: handle generators that report incorrect MCS for some frames + + Macbook and QCA generators sometimes report the minimum MCS for subframes + in an aggregate that have FCS errors. + + Change-Id: I77d1a81f5b3d0e3d0755adcb889f1237b0257814 + Reviewed-on: https://code.wireshark.org/review/23521 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 7cc677e561b9e40e87f9fbeb64b443ce5f1b52e4) + Reviewed-on: https://code.wireshark.org/review/24623 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit c4a9b5328d +Author: Simon Barber <simon.barber@meraki.net> +Date: Tue Jun 20 08:21:09 2017 +0100 + + ieee80211-radio: allow 0 duration and handle missing phy type + + Allows duration to be calculated to 0 + Handles generators where PHY type is not reported, but it can be + determined from the rate. + + Change-Id: Ic0b9e1b0e3e51f4d5b670d25fea064daf250a55f + Reviewed-on: https://code.wireshark.org/review/22261 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 3978462fd31665f30432689634812a15c476406b) + Reviewed-on: https://code.wireshark.org/review/24622 + Tested-by: Petri Dish Buildbot + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit 99bed81d99 +Author: Simon Barber <simon.barber@meraki.net> +Date: Wed Nov 1 11:51:37 2017 -0700 + + wireless_timeline: fix blank display + + Sometimes when a file opens the timeline does not display, also sometimes when + zooming it disappears. + + Change-Id: I141eaef5f332a1de9af133abbeccede7c1cf5502 + Reviewed-on: https://code.wireshark.org/review/24209 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit fa2649ac61755b462ec49ea0a2bbfb8569dd0bad) + Reviewed-on: https://code.wireshark.org/review/24624 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit 640b9569b0 +Author: Gerald Combs <gerald@zing.org> +Date: Tue Nov 28 15:22:10 2017 -0800 + + Update the release notes for 2.4.3. + + Change-Id: Ida3edacd7a03aed72bc96a7522e8f4f2345b8fc5 + Reviewed-on: https://code.wireshark.org/review/24630 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit f40faca928 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Nov 28 15:06:13 2017 -0800 + + Report the actual *error* for CANT_GET_INTERFACE_LIST. + + CANT_GET_INTERFACE_LIST does *NOT* mean "No remote interfaces found.", + as in "there are no remote interfaces"; a NULL return from + get_remote_interface_list() and an err value of 0 means that. + CANT_GET_INTERFACE_LIST means "something bad happened and the error + string says what it is". Display that error string, so when people + report problems: + + https://github.com/the-tcpdump-group/libpcap/issues/666 + + they'll give the actual error message, and I'll fix my breakage of the + rpcap protocol negotiation: + + https://github.com/the-tcpdump-group/libpcap/commit/2972769d03dd60d4bce233a12d77a3464f0d9dc4 + + rather than just wondering what the problem was and asking the reporter + of the problem for more information. + + Report anything other than "there are no remote interfaces" as an error, + not a warning. + + Change-Id: Ia9381953d080e037254f21e47ee7ecc4619b7254 + Reviewed-on: https://code.wireshark.org/review/24627 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit ae65dc20eae7e21010b6e33b2cb11724d403acd9) + Reviewed-on: https://code.wireshark.org/review/24628 + +commit d908e4e677 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Tue Nov 28 12:52:27 2017 +0100 + + ui: Sort profile names + + Not all file systems returns a sorted list of filenames, so we need + to sort the entries before using the list in the Profile popup and + the Manage Profiles dialog. + + Change-Id: Ic1f2bfa77fb47fb8c406d891aee49b484876b4f7 + Reviewed-on: https://code.wireshark.org/review/24615 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit da910203539afc7fa37caa17ccf41674d7953ab0) + Reviewed-on: https://code.wireshark.org/review/24620 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit 5a6ee4fdce +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Tue Nov 28 13:58:51 2017 +0100 + + gitignore: Add packaging/macosx/PkgInfo + + Change-Id: I630fa8ae0c3d5f078922b4d6cb2ee064c31bd35e + Reviewed-on: https://code.wireshark.org/review/24616 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 87a8877007471c0e3113c21c8675bfe5d81b1289) + Reviewed-on: https://code.wireshark.org/review/24617 + +commit 1cdb774867 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sat Nov 11 04:29:15 2017 +0000 + + TLS13: update for draft -22 (Server Hello, HRR, CCS, NST) + + Draft -22 moved the server version to an extension and makes HRR look + like a SH. SH is now interpreted as TLS 1.2. Detecting TLS 1.3/HRR + requires scanning SH extensions before parsing the message, so do that. + + Changes: + - Add draft 22 version identifier. + - Recognize special Server Hello magic for HRR. + - Dissect SupportedVersions for SH/HRR, rename the field to match spec. + - Recognise new Server Hello format (including legacy fields). + - Move version detection up to handshake message dissection to allow + HRR (disguised as SH) to be detected as such. DTLS does not have HRR + and fragmentation makes it harder, so use its version as usual. + - Ignore ChangeCipherSpec again for draft 22 (do not add expert info). + - Allow NST ticket_nonce to be empty. + + Change-Id: I9d5f7dba173e1b5c901bf9a6917c65520ee60a2f + Ping-Bug: 12779 + Reviewed-on: https://code.wireshark.org/review/24340 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit d35ed012ce62fae4344e80a0df3742619a4eaa0f) + Reviewed-on: https://code.wireshark.org/review/24599 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit 6b33acf121 +Author: Michael Mann <mmann78@netscape.net> +Date: Sat Nov 25 23:42:47 2017 -0500 + + Bugfix DCE/RPC Decode As for GTK. + + An attempt at optimization broke GTK DCE/RPC Decode As because DCE/RPC + dissector tables aren't FT_UINT type. The "optimization" was trying + to retrieve dissector handle from FT_UINT typed dissector table. + Move retrieval of dissector handle to under FT_UINT check + + Change-Id: Id81cd79db60263155392aaac0c796a6484ef7504 + Reviewed-on: https://code.wireshark.org/review/24589 + Reviewed-by: Michael Mann <mmann78@netscape.net> + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit c0514ac4330695c66d346067d99a429c2bb6abbe) + Reviewed-on: https://code.wireshark.org/review/24598 + +commit 1e0f13fa17 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Nov 26 01:31:56 2017 -0800 + + *Always* set pinfo->p2p_dir from the wtap_pkthdr. + + Don't just do it if we're actually creating protocol tree information + for the "Frame" protocol; that information is used even when we're *not* + creating protocol tree information for "Frame". + + Bug: 14245 + Change-Id: Ie3754e15754fb6a73529e20d8fa68956e206a994 + Reviewed-on: https://code.wireshark.org/review/24593 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 7eb2c7dbc7b0cddb18297268677e3dc9a073f320) + Reviewed-on: https://code.wireshark.org/review/24594 + +commit c07342e0b2 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 26 08:23:49 2017 +0000 + + [Automatic update for 2017-11-26] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I2ca731ff54ccacbb9e47bdffd6624f7a06f57119 + Reviewed-on: https://code.wireshark.org/review/24591 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 55dc94eab7 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Fri Nov 24 19:17:55 2017 +0100 + + Qt: AccordionFrame users keyPressEvent() fixes + + - Declare keyPressEvent() virtual. + - Give keyPressEvent() to parent when done. + + Change-Id: If1c05e86a5ab71dd239c025cdb2bcfb1ef484811 + Reviewed-on: https://code.wireshark.org/review/24573 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Roland Knall <rknall@gmail.com> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 89ae2826d6158e62fe3db9c18d01721a2168e9cc) + Reviewed-on: https://code.wireshark.org/review/24588 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit 9c87b37bf7 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Mon Sep 18 20:24:20 2017 +0200 + + Qt: Add key events to accept and reject changes in FilterExpressionFrame + + Change-Id: Iba3fe50b3ca4953fc59ebd6235d04f6878d183a4 + Reviewed-on: https://code.wireshark.org/review/23607 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 6bc4de9a2674f86e70bb5fdff48e861f3f5e48c5) + Reviewed-on: https://code.wireshark.org/review/24587 + Tested-by: Petri Dish Buildbot + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit 1cd222928f +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Thu Nov 23 13:18:37 2017 +0100 + + Qt: Add key event to reject changes in AddressEditorFrame + + Also give focus to the name field. + + Change-Id: I409d48e513c04b510f1e3d838c05e1518e6d2e9d + Reviewed-on: https://code.wireshark.org/review/24547 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit b99677dea95a8886429574713d5a78dde9181959) + Reviewed-on: https://code.wireshark.org/review/24586 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit 8502fe94ef +Author: Michael Mann <mmann78@netscape.net> +Date: Sat Nov 25 00:32:23 2017 -0500 + + packet-iwarp-mpa.c: Stop FPDU dissection if the ULPDU_LENGTH field does NOT contain what is expected + + Bug: 14236 + Change-Id: I15f1bc70978d1e5ae3b4bba1ff87b590726cfaa1 + Reviewed-on: https://code.wireshark.org/review/24578 + Reviewed-by: Michael Mann <mmann78@netscape.net> + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit f23a6e193f90a02542c85cad07cb073abd6eb678) + Reviewed-on: https://code.wireshark.org/review/24580 + +commit 6ae2f811e6 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Fri Nov 24 00:03:53 2017 +0000 + + DTLS: fix decryption with EMS and client auth + + Similar to the TLS fix in v2.5.0rc0-1805-gd790c524b4, ensure that the + correct master secret is calculated when extended_master_secret is + enabled with client auth and a decrypted RSA premaster secret. + + Bug: 14243 + Change-Id: I3d8cecef0f0cc3ec73537053489adc2d0d45c947 + Reviewed-on: https://code.wireshark.org/review/24564 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 0074855364047c362c6161ddd68cb206c221c893) + Reviewed-on: https://code.wireshark.org/review/24568 + +commit 68a2477dec +Author: Peter Wu <peter@lekensteyn.nl> +Date: Fri Nov 24 00:05:05 2017 +0000 + + packet: ensure consistent layer number for heuristics dissector + + DTLS decryption works for single-pass dissection, but breaks in the + second pass. Turns out that "curr_layer_num" has decremented in the + second pass, resulting in a failure to lookup the decrypted data. + This decryption issue was triggered by v2.3.0rc0-3740-ge1f84f985e + ("Fix Decode As for protocols that may use tunneling."). + + The first time the UDP dissector invokes "dissector_try_heuristic", the + second time "call_heur_dissector_direct". The first one increments + "curr_layer_num", so do the same in the second case. + + Change-Id: I62679b817b02f42d073cfc07b88ec36d5bec5f04 + Bug: 14243 + Fixes: v1.11.4-rc1-468-g2cfda31ff0 ("Change the signature of dissector_try_heuristic() to return hdtbl_entry") + Reviewed-on: https://code.wireshark.org/review/24565 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 9ac02f18c981c175be83b41bded7462aef128a3d) + Reviewed-on: https://code.wireshark.org/review/24567 + +commit 51a3d99c7a +Author: Peter Wu <peter@lekensteyn.nl> +Date: Thu Nov 23 01:55:27 2017 +0000 + + TLS: fix decryption with EMS and client auth + + When extended_master_secret is enabled with client authentication, + decryption using an RSA private key file would fail because the wrong + master secret is derived. This happens due to an excess + CertificateVerify message in the handshake hash. + + Bug: 14243 + Change-Id: I02f8302ac4a85422f7df52a234bdddfcb5fe3307 + Reviewed-on: https://code.wireshark.org/review/24543 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit d790c524b41907ebaa0f29afec19ee6913173129) + Reviewed-on: https://code.wireshark.org/review/24566 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit dd530db658 +Author: Michael Mann <mmann78@netscape.net> +Date: Thu Nov 23 10:04:20 2017 -0500 + + BGP: Add Path Identifier to IPv6 NLRI + + # Conflicts: + # epan/dissectors/packet-bgp.c + + Bug: 14241 + Change-Id: I5e66b034cf5cd14e2557e5b7bfa3045c2232d1ae + Reviewed-on: https://code.wireshark.org/review/24553 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Roland Knall <rknall@gmail.com> + Reviewed-on: https://code.wireshark.org/review/24557 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + +commit 7857e105b3 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Mon Nov 20 21:13:21 2017 +0100 + + Qt: Main Welcome hover sparkline color fix. + + Use the default text color for sparkline in hovered items. This makes + the selected item look the same as non-selected items when hovering. + + This is related to g1ed38dc2. + + Change-Id: I96ba349067cf7d398d11425cfa5ada5e5b4d587c + Reviewed-on: https://code.wireshark.org/review/24516 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 90e236fd09d68bab09edb7b93227fc02de561a38) + Reviewed-on: https://code.wireshark.org/review/24519 + +commit ba4323ca6c +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 19 08:24:45 2017 +0000 + + [Automatic update for 2017-11-19] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Ife348ecbe2228a92018cb8f1019424ce5898f6de + Reviewed-on: https://code.wireshark.org/review/24488 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit ddb48408a9 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Nov 17 13:01:14 2017 +0100 + + 3GPP NAS: fix dissection of PCO MSISDN container ID + + 3GPP 24.008 is not very explicit regarding the encoding, but after + rereading 3GPP 23.003 and 3GPP 29.272, it is most likely the E.164 + number in TBCD encoding (so without TON/NPI byte). + + Change-Id: Iae58ccc2919d28cb802015205b3b5fb97a1c4abe + Reviewed-on: https://code.wireshark.org/review/24463 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 7f327cc5800817b7c443616235c91ba2c82e7860) + Reviewed-on: https://code.wireshark.org/review/24466 + +commit 63d8f36333 +Author: Graham Bloice <graham.bloice@trihedral.com> +Date: Fri Nov 17 12:03:03 2017 +0000 + + WSDG: Improve VS2015 chocolatey install + + Created an AdminDeployment.xml file for use with the chocolatey + package for VS2015 Community Edition and updated the WSDG to + include it. + + Bug: 14147 + Change-Id: Id2a701067bf38874cf0bf534cca55dba9cfd30d4 + Reviewed-on: https://code.wireshark.org/review/24464 + Petri-Dish: Graham Bloice <graham.bloice@trihedral.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Graham Bloice <graham.bloice@trihedral.com> + (cherry picked from commit 252ea22b97c0c0fe7a7ab1c712f275d52f1df2cd) + Reviewed-on: https://code.wireshark.org/review/24465 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit bfa9a66a92 +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu Nov 16 20:23:33 2017 -0800 + + Allow dumpcap to write to a named pipe. + + We didn't actually bother *opening* the named pipe if it wasn't named + "-" (meaning "use standard output"). Hilarity^WRandom failure behavior + ensued. + + Change-Id: If73cea232b13de664630d587167167ef53a95cba + Reviewed-on: https://code.wireshark.org/review/24454 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit bbeb5acb07132335fa7ccf89166429359cf1be37) + Reviewed-on: https://code.wireshark.org/review/24455 + +commit 09ba63e5da +Author: Graham Bloice <graham.bloice@trihedral.com> +Date: Tue Nov 14 15:36:57 2017 +0000 + + CMake: Make Qt5 packages required if building Qt version + + This stops folks failing when they don't have Qt + but are still attempting to build the Qt version. + + Change-Id: I31eb9433b25ca9a717cd10bc165f3820ae31687e + Reviewed-on: https://code.wireshark.org/review/24406 + Petri-Dish: Graham Bloice <graham.bloice@trihedral.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Graham Bloice <graham.bloice@trihedral.com> + (cherry picked from commit c43c58c434cced3df2e208094d1891e8447e0cfc) + Reviewed-on: https://code.wireshark.org/review/24408 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + +commit d6c686d7f2 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Nov 12 10:55:58 2017 -0800 + + Link with ZLIB_LIBRARIES if you link with wiretap. + + Wiretap may use zlib; if it does, ZLIB_LIBRARIES is set to refer to + zlib. On UN*X, you may be able to get away with linking a + dynamically-linked shared library with other dynamically-linked shared + libraries and not linking programs linked *with* that shared library + with those other shared libraries, but that may not work on Windows. + + We link most programs that use wiretap with ZLIB_LIBRARIES; do so with + androiddump and randpktdump as well. + + Bug: 14207 + Change-Id: I8e94197e06f5fd0ff8c95aa509dbcc2ff2a44cd4 + Reviewed-on: https://code.wireshark.org/review/24389 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e38c89d3a7aef37c404a616c493ca31c10a5afbb) + Reviewed-on: https://code.wireshark.org/review/24390 + +commit e206fc87c1 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 12 08:18:05 2017 +0000 + + [Automatic update for 2017-11-12] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I5044dada3610d3caa39d871d64ed0d1df8c1ab7e + Reviewed-on: https://code.wireshark.org/review/24372 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 8de1819814 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Thu Nov 9 18:56:31 2017 +0100 + + RIP: do not register proto_reg_handoff_rip() callback + + Bug: 14197 + Change-Id: Ib6a46e09622d85fabbf8465a9234af3a959b9663 + Reviewed-on: https://code.wireshark.org/review/24327 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 19a46ba774b127ca0b6a96772310f149f2ff198a) + Reviewed-on: https://code.wireshark.org/review/24328 + Petri-Dish: Michael Mann <mmann78@netscape.net> + +commit 58a1f37e51 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Wed Nov 8 21:35:11 2017 +0100 + + Qt: Give focus to preference value in PreferenceEditorFrame + + Select the preference value text and give focus when editing + a single preference. + + Ping-Bug: 14191 + Change-Id: I8d5f91c40118b9d74f1a65f5311aa92dfeb3e1b7 + Reviewed-on: https://code.wireshark.org/review/24306 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit c57ab694eca2e3d0bc6c7e8c01df8dce20c3631e) + Reviewed-on: https://code.wireshark.org/review/24317 + +commit d8075e5284 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Wed Nov 8 21:10:42 2017 +0100 + + Qt: Give focus to Title in ColumnEditorFrame + + Select the title text and give focus to the title when Edit Column. + + Bug: 14191 + Change-Id: I04fc5f6bcc830a15ef43fa2d06a1a729df52e370 + Reviewed-on: https://code.wireshark.org/review/24305 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 25c5d830c95872630ca87d21a3d9e3a7e084e0db) + Reviewed-on: https://code.wireshark.org/review/24316 + +commit 58a5750787 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Mon Sep 18 19:20:50 2017 +0200 + + Qt: Add key events to accept and reject changes in PreferenceEditorFrame + + Change-Id: I4a9c4b80b0438cd33c38b274a24a3b1b5db46cb8 + Reviewed-on: https://code.wireshark.org/review/23605 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 59fce46d01582e0d2ffd3a606fdd8b50c713f6a1) + Reviewed-on: https://code.wireshark.org/review/24315 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit f7ffe8f855 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Sun Sep 17 18:57:25 2017 +0200 + + Qt: Add key events to accept and reject changes in ColumnEditorFrame + + Change-Id: I5f9ee01ee3aca5b2d75136fff3d8dc3e90ca1a4e + Reviewed-on: https://code.wireshark.org/review/23585 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 3cb95b0521222766890fdd77d3f6294c98644321) + Reviewed-on: https://code.wireshark.org/review/24304 + +commit 11f70301a9 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Tue Nov 7 18:04:45 2017 +0100 + + proto.c: fix field display test in hfinfo_number_value_format_display64() + + While we are at it, let's use the FIELD_DISPLAY() macro everywhere. + + Bug: 14169 + Change-Id: I685cb7eb4b9c52f836762c92baeb636570a6d12f + Reviewed-on: https://code.wireshark.org/review/24285 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Richard Sharpe <realrichardsharpe@gmail.com> + (cherry picked from commit f8a1878202f46dda8194fb56af7619c887cec806) + Reviewed-on: https://code.wireshark.org/review/24292 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit 24d1acf403 +Author: Graham Bloice <graham.bloice@trihedral.com> +Date: Tue Nov 7 16:15:01 2017 +0000 + + CMake: Detection of HTMHelp + + CMake erroneously reports that HTMLHelp wasn't found + + The override of FindHTMLHelp.cmake now uses + FIND_PACKAGE_HANDLE_STANDARD_ARGS to do this correctly. + + Change-Id: I1bd24964365dea00af213092872e24cbfb5ee07d + Reviewed-on: https://code.wireshark.org/review/24281 + Reviewed-by: Graham Bloice <graham.bloice@trihedral.com> + Petri-Dish: Graham Bloice <graham.bloice@trihedral.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit b6d6eb90970993a6342834317cb70e2519cbeff1) + Reviewed-on: https://code.wireshark.org/review/24287 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit aec48301de +Author: Graham Bloice <graham.bloice@trihedral.com> +Date: Tue Nov 7 13:35:34 2017 +0000 + + Open Windows CHM Help from Help menu. + + Renable the link between the Menu help command and the locally + installed CHM help file. + + This allows the user to acces the appropriate help built for their + specific version rather than the latest version on the Wireshark + web site. + + Change-Id: I7bb3d418ba405d6c7614ab6d52f7b0eda843d0de + Reviewed-on: https://code.wireshark.org/review/24276 + Petri-Dish: Graham Bloice <graham.bloice@trihedral.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Graham Bloice <graham.bloice@trihedral.com> + (cherry picked from commit 62e81c5846afab51757eb48826ac02522e9864f3) + Reviewed-on: https://code.wireshark.org/review/24279 + +commit 5383c95b6f +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Nov 5 08:22:42 2017 +0000 + + [Automatic update for 2017-11-05] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I9fa8ba5558a0b3f95652b7494fbc3dedaaa591dd + Reviewed-on: https://code.wireshark.org/review/24246 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit e7c815fe23 +Author: Uli Heilmeier <uh@heilmeier.eu> +Date: Mon Oct 30 19:57:14 2017 -0400 + + TCP: Fix Riverbed probe option tvb handling + + With commit f30b1e3b3bc4cec85296c280cdae88d3d17fae04 TCP options are handled + in an own dissector table. Therefore we can't read ahead or behind to get + the SYN flag or the CFE flag. + + Bug: 14150 + Change-Id: Ibbf1836104d32216ddfa2d4e07dccbcf948bb26c + Reviewed-on: https://code.wireshark.org/review/24181 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Uli Heilmeier <openid@heilmeier.eu> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit d11f5dff8ef9e615a8d5d01ee8b88241fea42f09) + Reviewed-on: https://code.wireshark.org/review/24238 + +commit 78e14a83d1 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Thu Nov 2 15:21:52 2017 +0100 + + Do not register proto_reg_handoff_XXX callback when not required + + None of those protocols need to be notified of a preference change and + their proto_reg_handoff_XXX functions do not differentiate the initial + call from susequent ones, leading to an assert + + Bug: 14157 + Change-Id: Iac4d88ebef7688bced8daae857eb5c836a6babd6 + Reviewed-on: https://code.wireshark.org/review/24211 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 78ee8c419fe7ef07a7ff90b5b763a96d406c215c) + Reviewed-on: https://code.wireshark.org/review/24212 + +commit 815122de96 +Author: Gerald Combs <gerald@zing.org> +Date: Sun Oct 29 09:47:12 2017 -0700 + + make-manuf: Fix a comment. + + make-manuf lives in the "tools" directory. + + Conflicts: + tools/make-manuf + + Change-Id: I9be2d44178f27d46629c439ff61f624d8d99e681 + Reviewed-on: https://code.wireshark.org/review/24168 + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 1e8e9a807fd18c070489988c03e4ae5b4701667a) + Reviewed-on: https://code.wireshark.org/review/24204 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit f417e4bf05 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Oct 29 08:23:39 2017 +0000 + + [Automatic update for 2017-10-29] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I9b8df4680e8a3eb41785732c40467170e7058f7d + Reviewed-on: https://code.wireshark.org/review/24158 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 5a9b11f29f +Author: Michael Mann <mmann78@netscape.net> +Date: Fri Oct 27 21:07:05 2017 -0400 + + tshark: Use -G help instead of -G ? + + Not all platforms handle ? or -? *predictably* at the command line. + As long as "?" isn't replaced with a file name, it works, but if it + gets replaced by a file name... + + Bug: 13984 + Change-Id: I4496bb27fdef121967e7baf7b7f4a1bb0a44b00a + Reviewed-on: https://code.wireshark.org/review/24125 + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 7ddfee9aead225465cbcdd5a29d7af5332bdccb7) + Reviewed-on: https://code.wireshark.org/review/24133 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit baff2c098f +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 27 20:29:25 2017 -0700 + + Put all the 11n vs. 11ac stuff together. + + Also, there's no need to zero out the NSS values for 11ac - we zero out + the entire pseudo-header at the beginning. We only need to set them if + we *have* them. + + Change-Id: I9ebda7e246c24941ca77314bba6f86dea41e5992 + Reviewed-on: https://code.wireshark.org/review/24135 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit a1218446d9990fd2710c3f9fe565907c202393a9) + Reviewed-on: https://code.wireshark.org/review/24138 + +commit 883cb00a8d +Author: Nicolas Darchis <ndarchis@cisco.com> +Date: Thu Oct 26 08:32:56 2017 -0400 + + peekremote: Support properly 11ac MCS rates. + + The spatial streams amount support is still to be added. + + Bug: 14136 + Change-Id: I58b4ff4febcbd871c063a7add6a1e6b79ef23683 + Reviewed-on: https://code.wireshark.org/review/24079 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 86cb152b2fa95adbac629a65398f4b9b9949c95f) + Reviewed-on: https://code.wireshark.org/review/24136 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit d95a33dd15 +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Oct 27 19:43:47 2017 -0700 + + Don't add for "Decode As" if the dissector table doesn't support it. + + While we're at it, consistently use "name" as the name of the argument + giving the dissector table name. + + Change-Id: Ied54c88d0d3dd467fe9067b008b49ead754c31a2 + Reviewed-on: https://code.wireshark.org/review/24131 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 7c9ec1d13cdb29725c6d093b7cb21357fd43b5f9) + Reviewed-on: https://code.wireshark.org/review/24132 + +commit 52688c8abb +Author: Michael Mann <mmann78@netscape.net> +Date: Fri Oct 27 20:36:09 2017 -0400 + + packet-knxnetip.c: Fix bitmask + + Bug: 14115 + Change-Id: I836ee337f4727b0592cda074975c20a68fe7a27d + Reviewed-on: https://code.wireshark.org/review/24124 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 89e40fad2975fe8d1fcec8f786b19e45057938a5) + Reviewed-on: https://code.wireshark.org/review/24129 + +commit bf3d82479c +Author: Michael Mann <mmann78@netscape.net> +Date: Fri Oct 27 20:09:19 2017 -0400 + + Q931: Fix Q931_ISO_IEC_STANDARDIZED_CODING value + + It's typically masked with 0x60 without any bit shifting, + so make the value reflect it + + Bug: 14116 + Change-Id: I677c609a8e19a66ee557ac24c721ecb2312131a5 + Reviewed-on: https://code.wireshark.org/review/24123 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit c6c709490c5a38f7e45ef06843d30b0f8b40636a) + Reviewed-on: https://code.wireshark.org/review/24126 + +commit 8c7463090d +Author: João Valverde <joao.valverde@tecnico.ulisboa.pt> +Date: Fri Oct 27 14:23:03 2017 +0100 + + autotools: Fix LN_S usage + + "cp" always takes two arguments. + + Change-Id: I6183988a24a38b1091d31a4e533b329f89f35dac + Reviewed-on: https://code.wireshark.org/review/24114 + Petri-Dish: João Valverde <j@v6e.pt> + Tested-by: Petri Dish Buildbot + Reviewed-by: João Valverde <j@v6e.pt> + +commit 0b6a4441dd +Author: Paul Offord <paul.offord@advance7.com> +Date: Thu Oct 26 23:08:43 2017 +0100 + + TRANSUM: File loading slow with transum enabled + + This change improves performance through better handling of SYN - + SYN/ACK pairs. + + Bug: 14094 + Change-Id: Ie479f1b69fa48f85a2ed9f8f173533db25582bbd + Reviewed-on: https://code.wireshark.org/review/24090 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 1ceab868cd0c86e1a64e0b80150163a5b87b51ea) + Reviewed-on: https://code.wireshark.org/review/24095 + +commit 28e1de6c27 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Thu Oct 26 22:47:19 2017 +0200 + + proto.c: do not set an item length longer that the remaining tvb length + + Ping-Bug: 14128 + Change-Id: Iae5cb2f85d5d2fa3f2b6051aa57390a3f73d724a + Reviewed-on: https://code.wireshark.org/review/24087 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit e82adfba74957948781c0518088bd16365740c18) + Reviewed-on: https://code.wireshark.org/review/24093 + Petri-Dish: Michael Mann <mmann78@netscape.net> + +commit dd959711bb +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Thu Oct 26 23:23:17 2017 +0200 + + proto.c: protect against buffer overflow in proto_find_undecoded_data() + + Bug: 14128 + Change-Id: I01aadf2dc9a3f714caaef273a7e012c6f1840726 + Reviewed-on: https://code.wireshark.org/review/24088 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit ed20250c132c5855dcb0df991c31ab4de6b47a61) + Reviewed-on: https://code.wireshark.org/review/24091 + Petri-Dish: Michael Mann <mmann78@netscape.net> + +commit 1f13e62500 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Oct 25 15:58:21 2017 -0700 + + Clean up white space. + + Change-Id: If082be21933ea6e01ea2126d4aafa6c931d4674d + Reviewed-on: https://code.wireshark.org/review/24064 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit e7abfc397bfa8981b3813c19a64c36cfb275f21d) + Reviewed-on: https://code.wireshark.org/review/24065 + +commit cde1577799 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Oct 25 15:56:01 2017 -0700 + + Use a union for the IPv4/IPv6 address. + + That way, the compiler ensures proper alignment. In practice, the + alignment was probably proper anyway, but this makes sure. + + Change-Id: I5ddc028c97d6961692a297cac17236206b61169d + Reviewed-on: https://code.wireshark.org/review/24061 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit f46d4d6e3b0c1802829785222e17e6f3ea081303) + Reviewed-on: https://code.wireshark.org/review/24062 + +commit ff8c3afb21 +Author: João Valverde <joao.valverde@tecnico.ulisboa.pt> +Date: Wed Oct 25 23:08:19 2017 +0100 + + configure: Fix --with-libssh argument name mismatch + + Change-Id: I38a55f9354f400ebe7a9acdf28a52a0068d9f745 + Reviewed-on: https://code.wireshark.org/review/24058 + Reviewed-by: João Valverde <j@v6e.pt> + (cherry picked from commit 16309e41c8b61e20307af9de40ff9742bb19cc6d) + Reviewed-on: https://code.wireshark.org/review/24059 + +commit 52e51262b9 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Oct 25 12:06:39 2017 -0700 + + Use "not installed for development" for libgcrypt. + + This is similar phrasing to what I used for some other libraries; + hopefully it will keep people from asking "Why am I getting this error? + I installed libgcrypt" questions by making it clear that "installing + libgcrypt" might not be enough. + + Also, don't give a package name, because the package might not be called + "libgcrypt-devel" - it might be called "libgcrypt20-dev" of something + such as that. + + Change-Id: I486a239e346955666d08cad3b1f8e3a961120e76 + Reviewed-on: https://code.wireshark.org/review/24052 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 749447fc803770759600e14e9fb42e31bafa73f7) + Reviewed-on: https://code.wireshark.org/review/24053 + +commit 18b1f613f7 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Oct 24 12:03:19 2017 -0700 + + Fix registration of SIP atop SSL/TLS. + + See https://ask.wireshark.org/questions/64151/sip-tls-is-only-shown-as-tcp. + + Change-Id: Ife182136601007ff6a5713666d9fada5abcd00b9 + Reviewed-on: https://code.wireshark.org/review/24041 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 08a490328387eafb7f9d20293a2a5e97e6cf4268) + Reviewed-on: https://code.wireshark.org/review/24042 + +commit c3a041e495 +Author: Eldon Stegall <wireshark-gerrit@eldondev.com> +Date: Tue Oct 17 14:55:52 2017 +0000 + + Improve http object export for URLs with long extensions + + This allows the export of objects with extensions that may be longer + than the allowed file name of an export (due to underlying filesystem, etc). + The extension detection mechanism previously preserved everything in the file + name after the final ".", but in some cases (especially with long query strings) + this would exceed the allowed maximum file length, and simply refuse to export + the object. Now, if the length of the extension and duplicate number is longer + than the allowable file length, the extension is ignored, and the entire string + is truncated to allow an acceptable export filename. + + Bug: 14130 + Change-Id: I6fa0281519d031c07a9ac621002ac328f34f54cc + Reviewed-on: https://code.wireshark.org/review/23960 + Reviewed-by: Michael Mann <mmann78@netscape.net> + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit c7918da8a6b28fc515d273c16a9ffca2a4b9e119) + Reviewed-on: https://code.wireshark.org/review/24033 + +commit da4bf10044 +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Sun Oct 22 21:28:05 2017 +0200 + + mqtt: Fix some mistakes from previous commit + + - PUBREL, SUBSCRIBE and UNSUBSCRIBE does use QoS for v3.1 + - CONNACK is also different between v3.1 and v3.1.1 + - DUP flag is not reserved, it's Retain which is reserved + - Use proto_tree_add_item for reserved fields + - Use uniform layout and fixed indent (2 spaces in this file) + + Change-Id: I26337ad63cd67d832db84993349fa3406e305b72 + Reviewed-on: https://code.wireshark.org/review/24025 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit de066346a649906e7105b18d9f7a5f823ace43e2) + Reviewed-on: https://code.wireshark.org/review/24031 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit 452a110ab5 +Author: Flavio Santes <flavio.santes@1byt3.com> +Date: Sun Oct 15 06:18:38 2017 -0400 + + [RFC] dissector/mqtt: Fix handling of fixed header flags + + According to the MQTT v3.1 and v3.1.1 specifications, + the fixed header flags (DUP, QoS and RETAIN) are only set by + the PUBLISH message. + + The DUP flag is also set by the PUBREL, SUBSCRIBE and + UNSUBSCRIBE messages but only when version 3.1 is used. + + Currently, the MQTT dissector shows the header flags for + all the v3.1 and v3.1.1 messages. + + This patch fixes the issues mentioned above. + + To track the protocol version used during the connection handshake + a conversation is used. For subsequent messages, the way the header + flags are displayed is determined by this variable. + + Change-Id: Iad808f77a2c379f9786152c26d3aa86e24be1b16 + Signed-off-by: Flavio Santes <flavio.santes@1byt3.com> + Reviewed-on: https://code.wireshark.org/review/23939 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 89fe6629b73cea803d6bd803cd9131a9f39d8ccd) + Reviewed-on: https://code.wireshark.org/review/24030 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit a2a6132364 +Author: Flavio Santes <flavio.santes@1byt3.com> +Date: Sun Oct 15 05:15:13 2017 -0400 + + dissector/mqtt: Fix some inline comments + + There are some issues with the inline comments. Rephrase those + comments. Furthermore, use the MQTT v3.1 and v3.1.1 specification + language to fix some inline comments. + + Change-Id: Ia3864e1b66ef1eb4bbd8cb90aed674c7d9c4b7be + Signed-off-by: Flavio Santes <flavio.santes@1byt3.com> + Reviewed-on: https://code.wireshark.org/review/23937 + Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 0d6c5a79eb75e10f1d13b160c18a32c0bf57a2d7) + Reviewed-on: https://code.wireshark.org/review/24029 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit 73e01dfba0 +Author: Flavio Santes <flavio.santes@1byt3.com> +Date: Mon Oct 16 01:11:48 2017 -0400 + + dissector/mqtt: Add the protocol version string + + Add the protocol version string: + - 3 maps to MQTT v3.1 + - 4 maps to MQTT v3.1.1 + + Change-Id: I8cf1ba0c1bcabd5718467946b33082e4eb5a37ed + Signed-off-by: Flavio Santes <flavio.santes@1byt3.com> + Reviewed-on: https://code.wireshark.org/review/23938 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 1a8143172c973fb74fa7b329a8b698cbb42ef865) + Reviewed-on: https://code.wireshark.org/review/24028 + +commit ce66fecf4d +Author: Flavio Santes <flavio.santes@1byt3.com> +Date: Sun Oct 15 02:33:56 2017 -0400 + + dissector/mqtt: Add the MQTT protocol description + + The packet-PROTOABBREV.c template recommends to provide a short + description of the protocol below the license header. Currently, + this information is not present in the packet-mqtt.c dissector. + + This patch adds the protocol description taken from the official + specification. Links to the v3.1 and v3.1.1 specifications are + also provided by this patch. + + Change-Id: I9bb85aa3b78c8804c923f77c163904a7949f6899 + Signed-off-by: Flavio Santes <flavio.santes@1byt3.com> + Reviewed-on: https://code.wireshark.org/review/23936 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit 5967621d19204947021932ea86f1e55fbe810124) + Reviewed-on: https://code.wireshark.org/review/24027 + +commit 8bb88e8d68 +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Oct 22 08:20:51 2017 +0000 + + [Automatic update for 2017-10-22] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I43e2563a51fa754773e780472d9b2ca703ccd697 + Reviewed-on: https://code.wireshark.org/review/24014 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 8ce09be22f +Author: Peter Wu <peter@lekensteyn.nl> +Date: Fri Oct 20 03:43:03 2017 +0100 + + Qt: fix crash after loading SRT dialog + + TapParameterDialog::on_applyFilterButton_clicked first calls fillTree to + populate the table and endRetapPackets to add the results to GUI. The + table data must remain valid until closing the dialog since the user can + still interact with the GUI. + + Change-Id: Ie3105be78d39c562af52f2b49081552063afcada + Ping-Bug: 14141 + Reviewed-on: https://code.wireshark.org/review/23994 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 0088d010edb1dc9704efa1ad11e7d0975b6878ba) + Reviewed-on: https://code.wireshark.org/review/24004 + +commit 897ad59e29 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Oct 20 10:51:04 2017 +0200 + + file_util.c: do not leak service handle + + Follow-up of gd64c30052 + + Change-Id: I620b3fb44fe3090120f2d29809961623e00d55a4 + Reviewed-on: https://code.wireshark.org/review/23999 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit c23e3761a550ca5e44cb3878fa47d7c00f469424) + Reviewed-on: https://code.wireshark.org/review/24000 + +commit 32eab31120 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Wed Oct 18 10:11:56 2017 +0200 + + Do not add Npcap path if npf.sys service is found + + Otherwise you can end with 2 Packet.dll (the one from WinPcap and the one + from Npcap) being loaded at the same time, which can create incompatibilities. + + Bug: 14134 + Change-Id: Ia06066fd54b60296e55dbfce6c6f2ddd99367479 + Reviewed-on: https://code.wireshark.org/review/23969 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit d64c300522ffa830e061adeb81e75255b3f955ac) + Reviewed-on: https://code.wireshark.org/review/23997 + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + +commit 7fea71a57f +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Thu Oct 19 21:30:25 2017 +0200 + + LCSAP: fix retrieval of XML dissector handle + + Bug: 14131 + Change-Id: Ie77ade9d54f9d0a5fa0183cedc154e6595a489cf + Reviewed-on: https://code.wireshark.org/review/23991 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit fd1d13567d07bb429f9209c4c11a97c7ba02dab8) + Reviewed-on: https://code.wireshark.org/review/23992 + +commit ea119b4ed8 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Tue Oct 17 00:23:28 2017 +0100 + + ssl: regression fix for decryption with renegotiation + + A renegotiated session with decrypted records has !maybe_encrypted which + means that the plaintext buffer is passed to dissect_ssl3_handshake. Do + not assume that this plaintext buffer might be encrypted, it is + definitely not the case. + + Change-Id: I2ce9a5305e5cbc24b5c7e93077f7e796bf8cb406 + Fixes: v2.5.0rc0-1314-g9d189c7e20 ("ssl: assume everything after CCS is encrypted") + Ping-Bug: 14117 + Reviewed-on: https://code.wireshark.org/review/23948 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + (cherry picked from commit b5505fd4512456f85188a81e9b6478ecce65504b) + Reviewed-on: https://code.wireshark.org/review/23950 + +commit 3409e5978c +Author: Darien Spencer <cusneud@mail.com> +Date: Sun Oct 15 21:57:06 2017 +0300 + + rlc: Fix bug in 'RLC over UDP' dissector + + Reassembly of AM/UM packets doesn't work when the URNTI tag is missing and the default value of 0 is kept. This patch makes the default value 1 for those cases. + + Bug: 14129 + Change-Id: Id13121b5de63da4318214871b8963ceef5d28cf0 + Reviewed-on: https://code.wireshark.org/review/23930 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 2663881c378913d5c9cd123c469e1bb29a5e39be) + Reviewed-on: https://code.wireshark.org/review/23933 + Reviewed-by: Michael Mann <mmann78@netscape.net> + +commit f44b280f1d +Author: Peter Wu <peter@lekensteyn.nl> +Date: Sat Oct 14 18:43:58 2017 +0100 + + ssl: assume everything after CCS is encrypted + + After ChangeCipherSpec, record fragments are encrypted. Use this strong + hint to fix misinterpreting the explicit nonce as a handshake message. + One edge case remaing unsolved though, if an encrypted Finished message + follows the CCS in the same TCP packet, then it could still be + misinterpreted. + + Bug: 14117 + Change-Id: Ie54bb5335f115d0fd8f05a13d1c826e3807cbbd3 + Reviewed-on: https://code.wireshark.org/review/23900 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> + Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> + (cherry picked from commit 9d189c7e20de37f95b2ad70725ab65b9bf863227) + Reviewed-on: https://code.wireshark.org/review/23929 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit d6bb710f9c +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Oct 15 08:21:26 2017 +0000 + + [Automatic update for 2017-10-15] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I401ed4cd4b1591f978cd8c5770a590754b91157a + Reviewed-on: https://code.wireshark.org/review/23920 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 89bba239c6 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat Oct 14 11:55:58 2017 -0700 + + Update comment. + + Red Hat, at one point, provided a /usr/include/pcap/pcap.h without + bothering to also provide a /usr/include/pcap.h that linked to it or + included it, breaking source compatibility. That's what we're working + around when we search in both the top-level include directories and, if + they exist, pcap subdirectories of those directories. + + libpcap 1.0 and later also put pcap.h in a pcap subdirectory, but also + provided a pcap.h in the top-level include directory that included + pcap/pcap.h, preserving source compatibility, so that's not the reason + we're searching in the top-level include directories and their pcap + subdirectories. + + Change-Id: I8f427d46ce8293d278be9005ee623cda1ea5d691 + Reviewed-on: https://code.wireshark.org/review/23902 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit c2f1ab1cbcc07af13935c037534148b132aec46b) + Reviewed-on: https://code.wireshark.org/review/23903 + +commit 72e8251656 +Author: Guy Harris <guy@alum.mit.edu> +Date: Wed Oct 11 12:31:16 2017 -0700 + + Add --print as an alias for -P, to match tcpdump. + + tcpdump just got a --print option, which causes packet information to be + printed even if the raw packets are being saved to a file with -w. We + have -P for the same purpose; make --print another name for it. + + While we're at it: + + document --help and --version; + + just speak of -P/--print as causing printing even of the packet + details, even though -V forces printing with -w, for consistency + with how --print is documented for tcpdump; + + fix the description of -h/--help. + + Change-Id: Idf650a202a09a2d1682edbd9d76123f1b1412b55 + Reviewed-on: https://code.wireshark.org/review/23888 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 9551aca9a685e97a03d58eb63e4b791416ba4c63) + Reviewed-on: https://code.wireshark.org/review/23890 + +commit aed7c31f1c +Author: Gerald Combs <gerald@wireshark.org> +Date: Mon Oct 9 15:10:27 2017 -0700 + + Fuzz: Limit the number of packets we process with Valgrind. + + Estimating the effort required to process a capture based on its size + isn't very reliable. Instead of rejecting files that are too large, just + limit Valgrind fuzzing to the first 100,000 packets in each file. This + should fix a timeout issue we're seeing on the master fuzzer. + + Change-Id: I0117735341d3a183c6131f5f05dbd1d559fc4b3f + Reviewed-on: https://code.wireshark.org/review/23872 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + (cherry picked from commit d72a18faad55d6f47af47acfb9d9270015bad2e2) + Reviewed-on: https://code.wireshark.org/review/23883 + +commit 48cdc507cb +Author: Gerald Combs <gerald@wireshark.org> +Date: Mon Oct 9 12:19:02 2017 -0700 + + Fuzz: Write memory leak info to the error log. + + When we exit due to excessive memory leaks make sure we say so in the + error log. + + Change-Id: I03f60271f3e4bb467fbaa5b9ac17431eed96f300 + Reviewed-on: https://code.wireshark.org/review/23870 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + (cherry picked from commit e8dbf386d8a830d822ff5f2857c63338a7998abb) + Reviewed-on: https://code.wireshark.org/review/23882 + +commit 696606dfb4 +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Oct 10 13:04:06 2017 -0700 + + 2.4.2 → 2.4.3. + + Change-Id: I3076f0e61bc02879754fde1dab01227f114a3ffb + Reviewed-on: https://code.wireshark.org/review/23877 + Reviewed-by: Gerald Combs <gerald@wireshark.org> @@ -1,4 +1,4 @@ - Wireshark 2.4.2 Release Notes + Wireshark 2.4.3 Release Notes __________________________________________________________________ What is Wireshark? @@ -12,54 +12,49 @@ What's New Bug Fixes The following bugs have been fixed: - * [1]wnpa-sec-2017-42 - BT ATT dissector crash ([2]Bug 14049) [3]CVE-2017-15192 - * [4]wnpa-sec-2017-43 - MBIM dissector crash ([5]Bug 14056) [6]CVE-2017-15193 - * [7]wnpa-sec-2017-44 - DMP dissector crash ([8]Bug 14068) [9]CVE-2017-15191 - * [10]wnpa-sec-2017-45 - RTSP dissector crash ([11]Bug 14077) [12]CVE-2017-15190 - * [13]wnpa-sec-2017-46 - DOCSIS infinite loop ([14]Bug 14080) [15]CVE-2017-15189 - - * Wireshark crash when end capturing with "Update list of packets in - real-time" option off. ([16]Bug 13024) - * Diameter service response time statistics broken in 2.2.4. ([17]Bug - 13442) - * Sequence number isn't shown as the X axis in TCP Stream Graph - - RTT. ([18]Bug 13740) - * Using an SSL subdissector will cause SSL data to not be decoded - (related to reassembly of application data). ([19]Bug 13885) - * Wireshark 2.4.0 doesn't build with Qt 4.8. ([20]Bug 13909) - * Some Infiniband Connect Req fields are not decoded correctly. - ([21]Bug 13997) - * Voip Flow Sequence button crash. ([22]Bug 14010) - * wireshark-2.4.1/epan/dissectors/packet-dmp.c:1034: sanity check in - wrong place ?. ([23]Bug 14016) - * wireshark-2.4.1/ui/qt/tcp_stream_dialog.cpp:1206: sanity check in - odd place ?. ([24]Bug 14017) - * [oss-fuzz] ASAN: 232 byte(s) leaked in 4 allocation(s). ([25]Bug - 14025) - * [oss-fuzz] ASAN: 47 byte(s) leaked in 1 allocation(s). ([26]Bug - 14032) - * Own interface toolbar logger dialog for each log command. ([27]Bug - 14033) - * Wireshark crashes when dissecting DOCSIS REGRSPMP which contains - UCD. ([28]Bug 14038) - * Broken installation instructions for Visual Studio Community - Edition. ([29]Bug 14039) - * RTP Analysis "save as CSV" saves twice the forward stream, if two - streams are selected. ([30]Bug 14040) - * VWR file read ends early with vwr: Invalid data length 0. ([31]Bug - 14051) - * reordercap fails with segmentation fault 11 on MacOS. ([32]Bug - 14055) - * Cannot Apply Bitmask to Long Unsigned. ([33]Bug 14063) - * text2pcap since version 2.4 aborts when there are no arguments. - ([34]Bug 14082) - * gtpprime: Missing in frame.protocols. ([35]Bug 14083) - * HTTP dissector believes ICY response is a request. ([36]Bug 14091) + * [1]wnpa-sec-2017-47 + The IWARP_MPA dissector could crash. ([2]Bug 14236) + * [3]wnpa-sec-2017-48 + The NetBIOS dissector could crash. ([4]Bug 14249) + * [5]wnpa-sec-2017-49 + The CIP Safety dissector could crash. ([6]Bug 14250) + + * "tshark -G ?" doesn't provide expected help. ([7]Bug 13984) + * File loading is very slow with TRANSUM dissector enabled. ([8]Bug + 14094) + * packet-knxnetip.c:936: bad bitmask ?. ([9]Bug 14115) + * packet-q931.c:1306: bad compare ?. ([10]Bug 14116) + * SSL Dissection bug. ([11]Bug 14117) + * Wireshark crashes when exporting various files to .csv, txt and + other `non-capture file' formats. ([12]Bug 14128) + * RLC reassembly doesn't work for RLC over UDP heuristic dissector. + ([13]Bug 14129) + * HTTP Object export fails with long extension (possibly query + string). ([14]Bug 14130) + * 3GPP Civic Address not displayed in Packet Details. ([15]Bug 14131) + * Wireshark prefers packet.dll in System32\\Npcap over the one in + System32. ([16]Bug 14134) + * PEEKREMOTE dissector does not decode 11ac MCS rates properly. + ([17]Bug 14136) + * Visual Studio Community Edition 2015 lacks tools named in developer + guide. ([18]Bug 14147) + * TCP: Malformed data with Riverbed Probe option. ([19]Bug 14150) + * Wireshark Crash when trying to use Preferences | Advanced. ([20]Bug + 14157) + * Right click on SMB2 Message ID and then Apply as Column causes + Runtime Error. ([21]Bug 14169) + * Return [Enter] should apply change (Column title - Button Label + toolbars). ([22]Bug 14191) + * Wireshark crashes if "rip.display_routing_domain" is set to TRUE in + preferences file. ([23]Bug 14197) + * Entry point inflatePrime not found for androiddump.exe and + randpktdump.exe. ([24]Bug 14207) + * BGP: IPv6 NLRI is received with Add-path ID, then Wire shark is not + able to decode the packet correctly. ([25]Bug 14241) + * Wrong SSL decryption when using EXTENDED MASTER SECRET and Client + certificate request (mutual authentication). ([26]Bug 14243) + * Frame direction isn't always set if it comes from the pcapng record + header rather than the packet pseudo-header. ([27]Bug 14245) New and Updated Features @@ -71,25 +66,26 @@ What's New Updated Protocol Support - 6LoWPAN, Bluetooth, BOOTP/DHCP, BT ATT, BT LE, DCERPC, DMP, DOCSIS, - EPL, GTP, H.248, HTTP, InfiniBand, MBIM, RPC, RTSP, SSL, and WSP + 3GPP NAS, BGP, CIP Safety, DTLS, IEEE 802.11 Radio, IWARP_MPA, + KNXnet/IP, LCSAP, MQTT, NetBIOS, PEEKREMOTE, Q.931, RIP, RLC, SIP, + SSL/TLS, TCP, and TRANSUM New and Updated Capture File Support - Ixia IxVeriWave + There is no new or updated capture file support in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from - [37]https://www.wireshark.org/download.html. + [28]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be - found on the [38]download page on the Wireshark web site. + found on the [29]download page on the Wireshark web site. __________________________________________________________________ File Locations @@ -102,90 +98,81 @@ File Locations Known Problems - Dumpcap might not quit if Wireshark or TShark crashes. ([39]Bug 1419) + Dumpcap might not quit if Wireshark or TShark crashes. ([30]Bug 1419) - The BER dissector might infinitely loop. ([40]Bug 1516) + The BER dissector might infinitely loop. ([31]Bug 1516) Capture filters aren't applied when capturing from named pipes. - ([41]Bug 1814) + ([32]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. - ([42]Bug 2234) + ([33]Bug 2234) - Application crash when changing real-time option. ([43]Bug 4035) + Application crash when changing real-time option. ([34]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. - ([44]Bug 4985) + ([35]Bug 4985) - Wireshark should let you work with multiple capture files. ([45]Bug + Wireshark should let you work with multiple capture files. ([36]Bug 10488) __________________________________________________________________ Getting Help - Community support is available on [46]Wireshark's Q&A site and on the + Community support is available on [37]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for - all of Wireshark's mailing lists can be found on [47]the web site. + all of Wireshark's mailing lists can be found on [38]the web site. Official Wireshark training and certification are available from - [48]Wireshark University. + [39]Wireshark University. __________________________________________________________________ Frequently Asked Questions - A complete FAQ is available on the [49]Wireshark web site. + A complete FAQ is available on the [40]Wireshark web site. __________________________________________________________________ - Last updated 2017-10-10 17:02:59 UTC + Last updated 2017-11-30 17:01:36 UTC References - 1. https://www.wireshark.org/security/wnpa-sec-2017-42.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14049 - 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15192 - 4. https://www.wireshark.org/security/wnpa-sec-2017-43.html - 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056 - 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15193 - 7. https://www.wireshark.org/security/wnpa-sec-2017-44.html - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068 - 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15191 - 10. https://www.wireshark.org/security/wnpa-sec-2017-45.html - 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14077 - 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15190 - 13. https://www.wireshark.org/security/wnpa-sec-2017-46.html - 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080 - 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15189 - 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13024 - 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13442 - 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13740 - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13885 - 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13909 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13997 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14010 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14016 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14017 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14025 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14032 - 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14033 - 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14038 - 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14039 - 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14040 - 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14051 - 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14055 - 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14063 - 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14082 - 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14083 - 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14091 - 37. https://www.wireshark.org/download.html - 38. https://www.wireshark.org/download.html#thirdparty - 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 - 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 - 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 - 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 - 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 - 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 - 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 - 46. https://ask.wireshark.org/ - 47. https://www.wireshark.org/lists/ - 48. http://www.wiresharktraining.com/ - 49. https://www.wireshark.org/faq.html + 1. https://www.wireshark.org/security/wnpa-sec-2017-47.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236 + 3. https://www.wireshark.org/security/wnpa-sec-2017-48.html + 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14249 + 5. https://www.wireshark.org/security/wnpa-sec-2017-49.html + 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 + 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13984 + 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14094 + 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14115 + 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14116 + 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14117 + 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14128 + 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14129 + 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14130 + 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14131 + 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14134 + 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14136 + 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14147 + 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14150 + 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14157 + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14169 + 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14191 + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14197 + 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14207 + 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14241 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14243 + 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14245 + 28. https://www.wireshark.org/download.html + 29. https://www.wireshark.org/download.html#thirdparty + 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 + 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 + 37. https://ask.wireshark.org/ + 38. https://www.wireshark.org/lists/ + 39. http://www.wiresharktraining.com/ + 40. https://www.wireshark.org/faq.html diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc index 24a8185cb3..677a6d8161 100644 --- a/docbook/release-notes.asciidoc +++ b/docbook/release-notes.asciidoc @@ -23,11 +23,29 @@ The IWARP_MPA dissector could crash. // Fixed in master-2.4: 8502fe94ef // Fixed in master-2.2: 53cf81d4f2 +* ws-salink:2017-48[] ++ +The NetBIOS dissector could crash. +(ws-buglink:14249[]) +// cve-idlink:2017-xxxx[] +// Fixed in master: b59dc97dfe +// Fixed in master-2.4: 87b6ea2237 +// Fixed in master-2.2: 79768d63d1 + +* ws-salink:2017-49[] ++ +The CIP Safety dissector could crash. +(ws-buglink:14250[]) +// cve-idlink:2017-xxxx[] +// Fixed in master: 041e3e7c27, 3d6da018e7 +// Fixed in master-2.4: ec6972193c, 1166734b35 +// Fixed in master-2.2: 6966d5db73, 6966d5db73 + //* ws-buglink:5000[] //* ws-buglink:6000[Wireshark bug] //* cve-idlink:2014-2486[] //* Wireshark keeps leaving voicemails advertising timeshare condominiums in Fresno. (ws-buglink:0000[]) -// cp /dev/null /tmp/buglist.txt ; for bugnumber in `git log --stat v2.4.3rc0..| grep ' Bug:' | cut -f2 -d: | sort -n -u ` ; do gen-bugnote $bugnumber; pbpaste >> /tmp/buglist.txt; done +// cp /dev/null /tmp/buglist.txt ; for bugnumber in `git log --stat v2.4.4rc0..| grep ' Bug:' | cut -f2 -d: | sort -n -u ` ; do gen-bugnote $bugnumber; pbpaste >> /tmp/buglist.txt; done * "tshark -G ?" doesn't provide expected help. (ws-buglink:13984[]) @@ -71,8 +89,6 @@ The IWARP_MPA dissector could crash. * Frame direction isn't always set if it comes from the pcapng record header rather than the packet pseudo-header. (ws-buglink:14245[]) -// Left off at d908e4e677 - === New and Updated Features There are no new features in this release. @@ -90,11 +106,14 @@ There are no new protocols in this release. --sort-and-group-- 3GPP NAS BGP +CIP Safety DTLS +IEEE 802.11 Radio IWARP_MPA KNXnet/IP LCSAP MQTT +NetBIOS PEEKREMOTE Q.931 RIP diff --git a/version.conf b/version.conf index b999997703..cc8d9d1108 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add an "rc" to the version. -enable: 1 -pkg_format: rc0-%# -pkg_enable: 1 +#enable: 1 +#pkg_format: rc0-%# +#pkg_enable: 1 # Final release: Disable package version stamps. -#enable: 1 -#pkg_format: -#pkg_enable: 0 +enable: 1 +pkg_format: +pkg_enable: 0 |