diff options
-rw-r--r-- | ChangeLog | 1406 | ||||
-rw-r--r-- | NEWS | 203 | ||||
-rw-r--r-- | config.nmake | 2 | ||||
-rw-r--r-- | configure.ac | 2 | ||||
-rw-r--r-- | debian/changelog | 2 | ||||
-rw-r--r-- | docbook/asciidoc.conf | 2 | ||||
-rw-r--r-- | docbook/release-notes.asciidoc | 161 | ||||
-rw-r--r-- | epan/Makefile.am | 2 | ||||
-rw-r--r-- | filetap/Makefile.am | 2 | ||||
-rwxr-xr-x | make-version.pl | 2 | ||||
-rw-r--r-- | version.conf | 12 | ||||
-rw-r--r-- | wiretap/Makefile.am | 2 |
12 files changed, 64 insertions, 1734 deletions
@@ -1,1406 +0,0 @@ -commit 09da4d6 -Author: Gerald Combs <gerald@wireshark.org> -Date: Mon Sep 15 16:00:04 2014 -0700 - - Updates for 1.12.1. - - Change-Id: If2d28ca118b73ac96915ebada9cfc7cbb7a1518b - Reviewed-on: https://code.wireshark.org/review/4121 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit d73f272 -Author: Martin Kaiser <wireshark@kaiser.cx> -Date: Sat Sep 13 21:51:24 2014 +0200 - - dissect the alphanumeric message that's part of operation 30 - Bug: 10464 - - Change-Id: I1a42877ee549b40e0c739dd2d1cbe4615ed9b9bd - Reviewed-on: https://code.wireshark.org/review/4098 - Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> - Tested-by: Martin Kaiser <wireshark@kaiser.cx> - (cherry picked from commit ed7c3282b1434641ecd28311167c0a3b3f1eae74) - Reviewed-on: https://code.wireshark.org/review/4116 - -commit b429020 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Fri Sep 12 17:21:53 2014 -0400 - - Don't try to set the length, end, or text of a faked item. - - If we try we may (in the case of setting the length or end) mistakenly assert - out. - - Bug: 10329 - Change-Id: I52083ba17f6427712a6a363f48f1f7ae51f2b74b - Reviewed-on: https://code.wireshark.org/review/4093 - Reviewed-by: Evan Huus <eapache@gmail.com> - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - (cherry picked from commit af9d2dfa134eecf420fa5a9589e032db2909fe0d) - Reviewed-on: https://code.wireshark.org/review/4111 - -commit 4bd2382 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Sun Sep 14 18:42:39 2014 +0000 - - Revert "Only fake an item by returning 'tree' if they use the same TVB" - - Bug: 10329 - This reverts commit becb4d7837dbb506ec6359a72f7adbf0166ae0a2. - - Change-Id: I7a291beb52171eedd8d21e1f3ac2e5a33aea6a70 - Reviewed-on: https://code.wireshark.org/review/4110 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit d7aba08 -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Sep 14 08:08:37 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-09-14] - - Change-Id: If493ecdbbab2c4bfe9992937b4227acba63edcde - Reviewed-on: https://code.wireshark.org/review/4107 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit fe97d11 -Author: Martin Kaiser <wireshark@kaiser.cx> -Date: Wed Sep 10 23:03:57 2014 +0200 - - when we check the parameter for upper(), lower() or len(), - return an error if the parameter is _no_ string - - Bug: 10401 - Change-Id: I5643ef05009072538155e63c3178071ed6bab061 - Reviewed-on: https://code.wireshark.org/review/4071 - Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> - Tested-by: Martin Kaiser <wireshark@kaiser.cx> - (cherry picked from commit 283861892ca7a93c184355e6236a026516410cf9) - Reviewed-on: https://code.wireshark.org/review/4095 - -commit 4413725 -Author: Guy Harris <guy@alum.mit.edu> -Date: Thu Sep 11 13:29:37 2014 -0700 - - Add some additional checks in SnifferDecompress(). - - Check the input pointer in the while clause of the loop, so that we - handle an empty input buffer. - - When reading a bit mask, check before fetching the bit mask that we have - two bytes of bit mask and the byte after it. - - Before putting an uncompressed input byte into the output, make sure we - wouldn't run past the end of the output buffer. - - Before copying an earlier string from the output buffer, make sure it - doesn't run past the end of the data we've decompressed so far. - - Bug: 10461 - Change-Id: I8bb8d0d291368ae8bf0ac26970ff54d3262a7e6e - Reviewed-on: https://code.wireshark.org/review/4083 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 47c592938ba9f0caeacc4c2ccadb370e72f293a2) - Reviewed-on: https://code.wireshark.org/review/4084 - -commit 4a5c80b -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Wed Sep 3 21:57:02 2014 -0400 - - Don't print non-printable characters in AX.25 addresses. - - Add a new routine to wsutil to make this easy: printable_char_or_period(). - - Bug: 10439 - Change-Id: I0eb2bb6bc0676a1035c3d845b5e20276fa04de60 - Reviewed-on: https://code.wireshark.org/review/3981 - Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Michael Mann <mmann78@netscape.net> - (cherry picked from commit 2497482e34a108275f75cd8106e1841b35aab98e) - Change-Id: I0eb2bb6bc0676a1035c3d845b5e20276fa04de60 - Reviewed-on: https://code.wireshark.org/review/3985 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit c4421f1 -Author: Bill Meier <wmeier@newsguy.com> -Date: Thu Sep 11 12:43:08 2014 -0400 - - packet-cfm.c: Fix Bug 10385: "Ethernet OAM (CFM) frames including TLV's are wrongly decoded as malformed" - - Regression introduced in ga06cccb (svn #50352) [Jul 3 16:43:40 2013] - - Bug 10385 - Change-Id: I3f5c5518a5804a1f31cac554323a6fa8d3d55d5d - Reviewed-on: https://code.wireshark.org/review/4078 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit a8fabb94b6958ad66761d9346862bab402ab949e) - Reviewed-on: https://code.wireshark.org/review/4079 - -commit 96e5b50 -Author: Guy Harris <guy@alum.mit.edu> -Date: Mon Sep 8 14:49:53 2014 -0700 - - Do the PCR and the original PCR the same way. - - In both cases, make the extension a 16-bit variable, cast the result of - extracting the extension to guint16 to clarify that only the 9 bits - visible through the mask matter. - - While we're at it, there's no need to use - "proto_tree_add_uint64_format_value() if the format is just the standard - format for a 64-bit unsigned integer. - - Change-Id: I8f1f48595830d4672984f3797be1c9d994e64ea0 - Reviewed-on: https://code.wireshark.org/review/4043 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 7143bd72f9bc47f40f07763a9ef32459eaa5b311) - Reviewed-on: https://code.wireshark.org/review/4072 - Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> - -commit 881eb5c -Author: Bill Meier <wmeier@newsguy.com> -Date: Wed Sep 10 12:51:34 2014 -0400 - - packet-netflow.c: fix bug: "top-of-stack" --> "bottom-of-stack" - - Bug #10458 - Change-Id: I733bb54b13da8dd5b96837b57c1893e14f9622ec - Reviewed-on: https://code.wireshark.org/review/4067 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit 0164b7582106ceaf244e8792ee635257ab4bace4) - Reviewed-on: https://code.wireshark.org/review/4068 - -commit 7da6c7e -Author: Bill Meier <wmeier@newsguy.com> -Date: Wed Sep 10 10:24:10 2014 -0400 - - packet-opensafety.c: Fix two bugs: - - - Actually register dissector on default UDP ports upon startup. - - expert_...() shouldn't be called under 'if (tree)' - - Also: cleanup proto_reg_handoff...() and apply_prefs() code. - - Change-Id: I6390d9bf311c9a62fbc43647d9bb19f90156baec - Reviewed-on: https://code.wireshark.org/review/4063 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit cc412a6cdf5321925ff0d35f0bcc28b42af69483) - Reviewed-on: https://code.wireshark.org/review/4064 - -commit a706f62 -Author: Bill Meier <wmeier@newsguy.com> -Date: Tue Sep 9 15:59:49 2014 -0400 - - Fix some spelling and grammar in user-visible text strings. - - Change-Id: I198c3da22d6c176b0b589e85fa23ac924475596d - Reviewed-on: https://code.wireshark.org/review/4056 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - -commit 5a06576 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Mon Sep 8 11:50:41 2014 -0400 - - Register the dicom dissector by name so it can be used with SSL. - - Bug: 10450 - Change-Id: I786de3de39c6d4829135b67a64936c28757d1ff4 - Reviewed-on: https://code.wireshark.org/review/4038 - Reviewed-by: Evan Huus <eapache@gmail.com> - Reviewed-by: Anders Broman <a.broman58@gmail.com> - (cherry picked from commit 412662afb3c404df5a1e5e19988b0df8d594267a) - Reviewed-on: https://code.wireshark.org/review/4055 - Reviewed-by: Michael Mann <mmann78@netscape.net> - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit 3131847 -Author: Bill Meier <wmeier@newsguy.com> -Date: Tue Sep 9 10:27:46 2014 -0400 - - packet-sip.c: col_...() functions must not be called under 'if(...tree)' (even indirectly). - - Fixes Bug #10453 - - Change-Id: I39f64b801ce9231059ee7e03416dd3828dffeb1f - Reviewed-on: https://code.wireshark.org/review/4051 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit 6e7f9ec12e52c41ba2a9c44f4f321ede87677370) - Reviewed-on: https://code.wireshark.org/review/4052 - -commit e20f747 -Author: Martin Kaiser <wireshark@kaiser.cx> -Date: Sun Sep 7 18:40:36 2014 +0200 - - don't skip another 6 bytes after OPCR - Bug: 10446 - - simplify OPCR calculation while we're at it - - Change-Id: I8590e409895e712fe6bbb64ab23093caf5795fa7 - Reviewed-on: https://code.wireshark.org/review/4040 - Petri-Dish: Martin Kaiser <wireshark@kaiser.cx> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> - (cherry picked from commit 4af01a8f30722e969046ab3cd7a1e3e3e4e3d69e) - Reviewed-on: https://code.wireshark.org/review/4041 - -commit 0942b2c -Author: Evan Huus <eapache@gmail.com> -Date: Mon Sep 8 08:11:40 2014 -0400 - - ses: initialize pres_ctx_id in session struct - - Bug: 10454 - Change-Id: Ib381646cad0a039514117735c48b461c9950f705 - Reviewed-on: https://code.wireshark.org/review/4033 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 433a444d148f86f2562f804d25a57d00dc277cc0) - Reviewed-on: https://code.wireshark.org/review/4036 - -commit a6db4e8 -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Sep 7 08:10:02 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-09-07] - - Change-Id: I30424d9a31888b5ce1d183da3a2625524b4012c1 - Reviewed-on: https://code.wireshark.org/review/4025 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit 5635326 -Author: Pascal Quantin <pascal.quantin@gmail.com> -Date: Sat Sep 6 00:32:05 2014 +0200 - - 6LoWPAN: fix storage of contexts coming from ICMPv6 Router Advertisement messages - - Bug: 10443 - Change-Id: I1a74b4d3036c61f0c8e1fca6373845ea40d87808 - Reviewed-on: https://code.wireshark.org/review/4008 - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - Tested-by: Pascal Quantin <pascal.quantin@gmail.com> - (cherry picked from commit b515cd3aec86f529643293995097f5a38468efa3) - Reviewed-on: https://code.wireshark.org/review/4009 - -commit 5a6ef0e -Author: Michael Mann <mmann78@netscape.net> -Date: Fri Aug 15 21:32:57 2014 -0400 - - Escape double quotes when printing ABSOLUTE_TIME field - - This regression was introduced by the commit e5353bf1198d6abf748de78084ff64f597f13663 done for bug 10081 - - Bug: 10213 - Change-Id: I3925a47ef13055f10f49fa9fefd022731746fbb8 - Reviewed-on: https://code.wireshark.org/review/2572 - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> - Reviewed-by: Evan Huus <eapache@gmail.com> - Reviewed-by: Michael Mann <mmann78@netscape.net> - (cherry picked from commit b95e6e3a6195f7ae17a9c83cafbb1210c4aacc54) - Reviewed-on: https://code.wireshark.org/review/3949 - Petri-Dish: Michael Mann <mmann78@netscape.net> - -commit a8c6e07 -Author: Roland Knall <roland.knall@br-automation.com> -Date: Fri Aug 29 14:52:29 2014 +0200 - - openSAFETY: Adapt CRC for false-positives - - - There are rare false-positives, where the entire - frame consists of 0 except the addr and id field, - which will lead to a correct crc#1 calculation, - but still to a false-positive detection. This - patch fixes that - - - Two undefinite-loop errors are corrected as well - - Change-Id: Ibe5e56e0172ad3a3046bdc024da3711987116e8e - Reviewed-on: https://code.wireshark.org/review/3918 - Reviewed-by: Roland Knall <rknall@gmail.com> - Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - (cherry picked from commit db6f197c962200e0be717b953c0ebe7d7c908bf1) - Reviewed-on: https://code.wireshark.org/review/3950 - Reviewed-by: Michael Mann <mmann78@netscape.net> - -commit 1dba335 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Wed Jun 25 11:03:12 2014 -0400 - - Indicate tshark can read (-r) from stdin and named pipes now. - - (Though it works only with certain formats.) As requested in: - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2874#c4 - - Change-Id: I2ce0509d8750b21ae0167d12459074ba0f9506f8 - Reviewed-on: https://code.wireshark.org/review/2646 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit e0461ecd4384377042fe3787acddfcc4d1ed7587) - Reviewed-on: https://code.wireshark.org/review/3989 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit baf8839 -Author: Gerald Combs <gerald@wireshark.org> -Date: Wed Sep 3 14:41:02 2014 -0700 - - Work around an apparent bug in GtkFileChooserButton. - - It looks like some versions of GTK+ intialize GtkFileChooserButton with a - location set to NULL and crash when you select an item from the dropdown - menu. Make sure we have a valid location set in that case. - - Change-Id: If2556ef939b95d8af12581a7116a48fb46586f57 - Ping-Bug: 10434 - Reviewed-on: https://code.wireshark.org/review/3977 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - (cherry picked from commit 5e3a8fa85201b7f886ad41b85e6cf8c9eca4a978) - Reviewed-on: https://code.wireshark.org/review/3978 - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit 001338b -Author: Bill Meier <wmeier@newsguy.com> -Date: Tue Sep 2 14:41:52 2014 -0400 - - packet-netflow.c: netflow v9: Allow options template with zero-length scope section - - Fixes Bug #10432 - - Also: rework several comments. - - Change-Id: I292829f6dffaf5f500cb089cc8a45e1203a2e731 - Reviewed-on: https://code.wireshark.org/review/3959 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit 9555c24740540aff840605595919fa2f5e2a2c23) - Reviewed-on: https://code.wireshark.org/review/3960 - -commit bb7b3c0 -Author: Jamil Nimeh <jnimeh@gmail.com> -Date: Tue Aug 26 18:26:19 2014 +0200 - - TLS: fix dissection of status_request_v2 hello extension - - Bug: 10416 - Change-Id: I58a3faef227f7eafd61942cafa6e38a17557ee61 - Reviewed-on: https://code.wireshark.org/review/3865 - Reviewed-by: Evan Huus <eapache@gmail.com> - Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - (cherry picked from commit f2a7a6d50378ff6000e8c777855df945165ca125) - Reviewed-on: https://code.wireshark.org/review/3947 - -commit cce96e4 -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Aug 31 08:09:44 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-08-31] - - Change-Id: I4b929c84b3a6d027ba2f71962e6353a0ca2bef66 - Reviewed-on: https://code.wireshark.org/review/3929 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit f05d8a0 -Author: Pascal Quantin <pascal.quantin@gmail.com> -Date: Fri Aug 29 13:19:13 2014 +0200 - - 6LoWPAN: fix dissection when using multicast address compression - - Also update the value_string arrays with the various SAM/DAM combinations - - Bug: 10426 - Change-Id: I87f13c29f42770ec655d85e2247b847bfe28e3ba - Reviewed-on: https://code.wireshark.org/review/3915 - Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Evan Huus <eapache@gmail.com> - Reviewed-by: Anders Broman <a.broman58@gmail.com> - (cherry picked from commit 2eced3689d809e6a80a4d00a6bebd8b481e5ebc9) - Reviewed-on: https://code.wireshark.org/review/3921 - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - -commit 933f635 -Author: Pascal Quantin <pascal.quantin@gmail.com> -Date: Fri Aug 29 13:37:16 2014 +0200 - - 802.11: rename Control Frame Extension field to match the spec - - As reported by Richard Sharpe on -dev: https://www.wireshark.org/lists/wireshark-dev/201408/msg00236.html - - Change-Id: I16638982e14e566bb7e584a2d030c546d2223ebe - Reviewed-on: https://code.wireshark.org/review/3916 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit 47f96d974caf6670926f572bd724be5973d8bb3b) - Reviewed-on: https://code.wireshark.org/review/3917 - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit 4872e8a -Author: Pascal Quantin <pascal.quantin@gmail.com> -Date: Wed Aug 27 23:57:19 2014 +0200 - - NTP: fix parsing of control assignments with empty value - - Consider that ',' is a separator between assignments and make value presence optional - - Bug: 10417 - Change-Id: I23f2b4029548a1263d65ee11c6356270e7a89bd7 - Reviewed-on: https://code.wireshark.org/review/3884 - Reviewed-by: Evan Huus <eapache@gmail.com> - Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit edcd2dd57f1649dbb25f1ad0f4a3a77c4d454322) - Reviewed-on: https://code.wireshark.org/review/3889 - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - -commit fa483e6 -Author: Gerald Combs <gerald@wireshark.org> -Date: Wed Aug 27 13:55:12 2014 -0700 - - Increase the error buffer size for rpcap. - - If the rpcap port is unreachable pcap_findalldevs_ex can write more - than PCAP_ERRBUF_SIZE bytes to errbuf. E.g. if we try to capture from - Google's all-eights public DNS server we get: - - ---- - Can't get list of interfaces: Is the server properly installed on 8.8.8.8? - connect() failed: A connection attempt failed because the connected - party did not properly respond after a period of time, or established - connection failed because connected host has failed to respond. (code 1 - ---- - - Set the buffer to PCAP_ERRBUF_SIZE*4 bytes. Hopefully that's large enough. - - Change-Id: I19f34cda16050c1ba8b9d7d6ed2d8e77b945a2af - Ping-Bug: 3554 - Ping-Bug: 6922 - Ping-Bug: 7021 - Reviewed-on: https://code.wireshark.org/review/3880 - Petri-Dish: Gerald Combs <gerald@wireshark.org> - Reviewed-by: Evan Huus <eapache@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Gerald Combs <gerald@wireshark.org> - (cherry picked from commit 5ee328e90b26f82fbd00316110c5edd9a5c852e6) - Reviewed-on: https://code.wireshark.org/review/3886 - -commit dfc005a -Author: Peter Wu <peter@lekensteyn.nl> -Date: Wed Jul 30 13:13:10 2014 +0200 - - Hack to fix RTP player progress line position - - PortAudio seems to return 0 as value for Pa_GetStreamTime() on - a PulseAudio system using the ALSA host API. This is known for 3 years, - but still has not been fixed. As this function basically gives us a - monotonically increasing clock in seconds as double, just use the Glib - library function for that. I don't know whether this adds much latency, - but it is certainly better than breaking the progress line (and also - the related auto-scroll). - - While at it, split the idx calculation and explain what each part does - and add modelines. Remove invalid _U_ annotations. - - [1]: http://music.columbia.edu/pipermail/portaudio/2011-June/012452.html - - Bug: 10307 - Change-Id: I67fff531e0577add4b9b76052e286fb3fd5d01ff - Reviewed-on: https://code.wireshark.org/review/3260 - Petri-Dish: Evan Huus <eapache@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit a68eab6ab57e2ba3dff5f49a90cdf9bd81a45f0a) - Reviewed-on: https://code.wireshark.org/review/3815 - -commit 74d8c02 -Author: Bill Meier <wmeier@newsguy.com> -Date: Mon Aug 25 22:39:59 2014 -0400 - - packet-mausb.c: proto-reg-handoff() fixes - - - proto_reg_handoff...(): - Fix handling of tcp port pref change; - Rename 'gPORT_PREF' to 'mausb_tcp_port_pref'; - Do 'dissector_add_uint("llc.mausb_pid",..)' only once; - - Change-Id: Ic4498560f61d0ce95f8109c3a1bb3c407221269b - Reviewed-on: https://code.wireshark.org/review/3854 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit f4b135c147497f168bafa77910fb819166e8dd81) - Reviewed-on: https://code.wireshark.org/review/3878 - -commit 57c2e5a -Author: Alexis La Goutte <alexis.lagoutte@gmail.com> -Date: Tue Aug 26 21:36:53 2014 +0200 - - CAPWAP : Fix wrong offset for AC Name with Priority - - Thanks to Massimo Velluci for sample - - Change-Id: Ibab2658c2c11c9940d3fdebb0bdc42752d57e1ae - Reviewed-on: https://code.wireshark.org/review/3871 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit 2263b73ae59f8e9d9abf76d84194437f14fce33a) - Reviewed-on: https://code.wireshark.org/review/3872 - -commit c51605b -Author: Matthieu Texier <matthieu@texier.tv> -Date: Mon Aug 25 15:22:07 2014 +0200 - - BGP: issue with BGP AS path heuristic (AS_CONFED_SET) - - Add also a expert info when unable determine ASN length (2 or 4 bytes) - - Bug: 10399 - Change-Id: I24978e29e24f38c2e01e4b953a5a51496f0cf5a6 - Reviewed-on: https://code.wireshark.org/review/3831 - Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit d127b573116f04352e811591644e15b69f0f7a62) - Reviewed-on: https://code.wireshark.org/review/3839 - -commit 25dcfb9 -Author: Bill Meier <wmeier@newsguy.com> -Date: Mon Aug 25 10:39:51 2014 -0400 - - packet-a21.c: Fix a bug; - - - expert_...() and external dissectors shouldn't be called under 'if (tree)'; - - Change-Id: I11dc61d11be6179a22d63a72847e7c76a9ff7a5a - Reviewed-on: https://code.wireshark.org/review/3835 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - -commit 505837f -Author: Alexis La Goutte <alexis.lagoutte@gmail.com> -Date: Mon Aug 25 16:02:07 2014 +0200 - - RPKI RTR: Wrong decoding of RPKI RTR End of Data PDU - - The decoding of the End of Data PDU ignores the Serial Number, i.e., the last 32 bit of this PDU. Instead of that the current dissector implementation starts to decode a new RTR PDU. - - Details of packet format see http://tools.ietf.org/html/rfc6810#section-5.8 - - Found by Matthias Wählisch - - Bug: 10411 - Change-Id: I8451b5fbda18a034022b97ff442ddb2a2dabed7b - Reviewed-on: https://code.wireshark.org/review/3832 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit f44e082fa8403023425e27b28cb295f4e40e34e6) - Reviewed-on: https://code.wireshark.org/review/3833 - -commit 7beb44d -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Aug 24 08:09:01 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-08-24] - - Change-Id: I13eff7b6d9b7f3db0a531b65b20a3f4b3626a8c8 - Reviewed-on: https://code.wireshark.org/review/3812 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit febba25 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Wed Aug 20 11:14:38 2014 -0400 - - If the user explicitly requested gnutls or libgcrypt generate an error if they - are not found. - - Accurately describe the default behavior: Wireshark will use the libraries if - they are available. - - May help avoid problems like that described in: - https://ask.wireshark.org/questions/35600/not-able-to-configure-wireshark-with-gnutls - - Change-Id: I5f0b2ce87cb7c6b337de93609f13d8027e662263 - Reviewed-on: https://code.wireshark.org/review/3750 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - (cherry picked from commit 61b01c37a9f9839a2ad004796e26d74eb8fdc0d1) - Reviewed-on: https://code.wireshark.org/review/3771 - -commit a05a2d9 -Author: Guy Harris <guy@alum.mit.edu> -Date: Tue Aug 19 00:16:04 2014 -0700 - - The error report timer is non-negative; make it FT_UINT16. - - This squelches an assertion. - - Use %u to print it, while we're at it. - - Change-Id: I79d06c5448a159e3e04930db776a9063c1004c03 - Reviewed-on: https://code.wireshark.org/review/3712 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - -commit 682cae1 -Author: Guy Harris <guy@alum.mit.edu> -Date: Mon Aug 18 12:08:53 2014 -0700 - - Don't use proto_tree_add_expert() with an item rather than a tree. - - proto_tree_add_expert() is to be used only on an item that's been - created as a tree (i.e., an interior node, complete with an ett_ value); - to hang expert info off of an *item*, which might *not* have been set up - to take subtree items, use expert_add_info(). - - Change-Id: Icdcdf39c31c0a03ff80dbb629186e8f6fa82e8ab - Reviewed-on: https://code.wireshark.org/review/3705 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit a3cecb290938f56787c0e08b30fc34749bb4baec) - Reviewed-on: https://code.wireshark.org/review/3706 - -commit f0e8636 -Author: Guy Harris <guy@alum.mit.edu> -Date: Sun Aug 17 17:32:16 2014 -0700 - - If we don't find a NetScaler signature, don't report an error. - - It's *NOT* an error; it's just a file that isn't a NetScaler file. - Otherwise, we report errors on files that should just be passed on to - other open routines. - - Also, NetScaler files are *NOT* text files, and we should *NOT* use - ".txt" as the suffix. - - Change-Id: If001abbbbc3de3ea27439a44a47ce1d6071d38ae - Reviewed-on: https://code.wireshark.org/review/3678 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit b8293f95ad18bc1cc00363627471c880d0f4e5a2) - Reviewed-on: https://code.wireshark.org/review/3679 - -commit 968858c -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Aug 17 08:09:03 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-08-17] - - Change-Id: I748b8ab2e2935e1a08ccd5b7fb17477975b9377a - Reviewed-on: https://code.wireshark.org/review/3672 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit 949cca0 -Author: Evan Huus <eapache@gmail.com> -Date: Sat Aug 16 13:58:26 2014 -0400 - - rtsp: parse the correct token for the status code - - Don't call get_token_len on next_token *and* pass in next_token to store the - subsequent pointer - the token we want to parse is the *current* value of - next_token, not the next next token (which may be beyond the end of the buffer, - if next_token happens to be the *last* token). - - Bug: 10381 - Change-Id: I9fb27e8bdaf2f9556f61841de30cec04b98ffb96 - Reviewed-on: https://code.wireshark.org/review/3663 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 73959159dbf34b4a0b50fbd19e05cb1b470be9b0) - Reviewed-on: https://code.wireshark.org/review/3664 - -commit 6c73bc5 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Thu Aug 14 14:02:04 2014 -0400 - - Don't let the user enable echld and tfshark (which are works in progress) in - this branch. - - Cherry-picked from change 3596 which also made these changes: - - Move them to the end of the list of optional programs. - Make it clear that echld is not built by default. - Change capitalization of tshark and tfshark. - - Change-Id: Ib702ed72eb2469968e06a16c73a4009ba4cf68ad - Ping-Bug: 10380 - Reviewed-on: https://code.wireshark.org/review/3596 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> - Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com> - Petri-Dish: Gerald Combs <gerald@wireshark.org> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - Reviewed-on: https://code.wireshark.org/review/3624 - Reviewed-by: Evan Huus <eapache@gmail.com> - Reviewed-by: Christopher Maynard <Christopher.Maynard@gtech.com> - -commit fee236b -Author: Guy Harris <guy@alum.mit.edu> -Date: Fri Aug 15 03:15:32 2014 -0700 - - An NLPID of 0xc0 refers to TRILL. - - This will, at least, make it show up as the meaning of a field - containing an NLPID; whether it's actually used to say "a TRILL packet - follows" is another matter. - - At least partially addresses bug 10382, and fully addresses it if it's - never actually used to say "a TRILL packet follows". - - Change-Id: Ic9dc8ec432532bde692fad3aa9cc97a3109aa634 - Reviewed-on: https://code.wireshark.org/review/3602 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 2cab8766c35b4f1a9b699fbc194aa57e9bef3e8a) - Reviewed-on: https://code.wireshark.org/review/3627 - -commit 9337e79 -Author: oyv <ronningstad@gmail.com> -Date: Fri Aug 15 11:56:28 2014 +0200 - - btle advertising header flags (RxAdd/TxAdd) dissected incorrectly - - bug:10384 - Signed-off-by: oyv <ronningstad@gmail.com> - - Change-Id: Ic31772c551f36fc8d144a5eaeae987a1e5f3e3f1 - Reviewed-on: https://code.wireshark.org/review/3601 - Reviewed-by: Michael Mann <mmann78@netscape.net> - -commit a789ebd -Author: Guy Harris <guy@alum.mit.edu> -Date: Fri Aug 15 03:50:15 2014 -0700 - - Regenerate manuf with the updated wka.tmpl. - - Bug: 10383 - Change-Id: I107daae8ddd95b98a769bc2baf602aaf0454f2a2 - Reviewed-on: https://code.wireshark.org/review/3606 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - -commit 1aa25b1 -Author: Guy Harris <guy@alum.mit.edu> -Date: Fri Aug 15 03:26:02 2014 -0700 - - Add some missing group addresses. - - Bug: 10383 - Change-Id: I94c9604824f25347fcd3c7bfd5c18aabdbe0a332 - Reviewed-on: https://code.wireshark.org/review/3603 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 47bb34a43a72d0117e5f8f1824fcc00108e8d10f) - Reviewed-on: https://code.wireshark.org/review/3605 - -commit 2035d31 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Wed Aug 13 21:05:38 2014 -0400 - - Fix the uninitialized-read error reported in bug 10370. - - Fix apparent cut-n-pasteo: if offset_e is set then we should be looking - at offset_e (instead of offset_s) and ts_end (instead of ts_start). - - Bug: 10370 - Change-Id: I0683ad55ac782c7fd03b7dbdf3f34df713267de5 - Reviewed-on: https://code.wireshark.org/review/3589 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 44698259b1f5865c60323acaf2a633654a2abe81) - Reviewed-on: https://code.wireshark.org/review/3591 - -commit 0af9dd7 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Wed Aug 13 17:40:16 2014 -0400 - - Use a wildcard to exclude all Wireshark (GUI) binaries: rpmbuild in RHEL6 - errors out if you %exclude a file that's not there. - - Fixes the issue reported by Chris on the -dev list. - - Change-Id: If8d8b6a9ee69c3d94756b729a809f3c04fc2517f - Reviewed-on: https://code.wireshark.org/review/3586 - Reviewed-by: Christopher Maynard <Christopher.Maynard@gtech.com> - Petri-Dish: Christopher Maynard <Christopher.Maynard@gtech.com> - (cherry picked from commit a83f67cb85926e42314d25f7ddbbd66dbae5b6ed) - Reviewed-on: https://code.wireshark.org/review/3590 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit 9069d7b -Author: Evan Huus <eapache@gmail.com> -Date: Tue Aug 12 20:21:19 2014 -0400 - - hip: fix infinite loop in dissect_hip_tlv - - We can't use tree_item == NULL to determine which branch of the previous if was - hit, since proto_tree_add_item can return NULL when run without tree, which was - leading to an infinite loop since we were never advancing the offset. Use the - actual locator_type instead. - - Introduced by either g3635d7bed70 or gebff85fdbb although neither of them - directly touch this code path. I'm guess that g3635d7bed70 removed an if (tree) - guard in some calling function which would have prevented this, but I haven't - checked. The bug would still have been there before, it just wouldn't have been - hit because it's only present with a NULL tree. Somebody more familiar with the - protocol should probably go over a capture or two and make sure this isn't a - symptom of some other decoding gone awry in the recent changes. - - Change-Id: Ie1ce89b16ef667b437c0d99c25e3f3cb2504347d - Reviewed-on: https://code.wireshark.org/review/3564 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit d9e5021fe79973d00ddd8fcef0bbefbaae63dd0f) - Reviewed-on: https://code.wireshark.org/review/3567 - -commit afce994 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Tue Aug 12 10:09:03 2014 -0400 - - When checking if a message is Diameter also check for a minimum message length. - - This improves the detection of Diameter messages within a TCP bytestream (i.e., - when the Diameter PDUs don't neatly align with frames). - - Bug: 10362 - Change-Id: I49a6e8cf076a6ab8a14761493aab9f3b11e4756e - Reviewed-on: https://code.wireshark.org/review/3557 - Petri-Dish: Evan Huus <eapache@gmail.com> - Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 433eeda109bdd5e4ed3860d13ea67e357befae6b) - Reviewed-on: https://code.wireshark.org/review/3561 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit 5a32e52 -Author: Pascal Quantin <pascal.quantin@gmail.com> -Date: Sun Aug 10 16:48:40 2014 +0200 - - NSIS: check Windows version before running uninstaller - - Change-Id: Icc8d725bff484c48d14e0a9208c545ca512a9768 - Reviewed-on: https://code.wireshark.org/review/3533 - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - Reviewed-by: Christopher Maynard <Christopher.Maynard@gtech.com> - Petri-Dish: Christopher Maynard <Christopher.Maynard@gtech.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Anders Broman <a.broman58@gmail.com> - (cherry picked from commit ddada16e68c185087d526aba8dbb1296fff974c0) - Reviewed-on: https://code.wireshark.org/review/3555 - -commit af50351 -Author: Dom Gifford <Dominic.Gifford@atmel.com> -Date: Thu Jul 24 15:32:55 2014 +0100 - - Fix support for decrypting 802.11 broadcast messages. - - A little bit of guess work is involved as the group key can use a - different cipher to the pairwise key, and we are trying to do this - purely based on the EAPOL messages with no prior knowledge of the - associate request. We try to guess the cipher based on the lengths. - - Bug:8734 - Change-Id: I4c456b45939c00a9d1122406891f704fa037349c - (cherry picked from commit 8da72cd43dcd597c9f03754831d55211a17f077c) - Reviewed-on: https://code.wireshark.org/review/3503 - Petri-Dish: Evan Huus <eapache@gmail.com> - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit 8ecd485 -Author: Eugene Sukhodolin <eugene@sukhodolin.com> -Date: Sun Aug 10 23:02:30 2014 -0700 - - Minor typo corrections - - Change-Id: I5962ba6a9b9285095ddacf00307a3094c697461a - Reviewed-on: https://code.wireshark.org/review/3546 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit 9deb7690963ea1132dd896d853acd976dc8a75c2) - Reviewed-on: https://code.wireshark.org/review/3547 - -commit e82dc02 -Author: Alexis La Goutte <alexis.lagoutte@gmail.com> -Date: Fri Aug 8 19:50:24 2014 +0200 - - Qt: Fix when build with Qt < 4.8.0 - - StyleName is not available in Qt < 4.8 - - Change-Id: Icbfcef7c62b124ce67f1a02ed928a96233ae2d9d - Reviewed-on: https://code.wireshark.org/review/3508 - Reviewed-by: Christopher Maynard <Christopher.Maynard@gtech.com> - (cherry picked from commit 020d0f89637faab8ec0e25e07d64eb66d96c2a72) - Reviewed-on: https://code.wireshark.org/review/3525 - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit e354501 -Author: Bill Meier <wmeier@newsguy.com> -Date: Sat Aug 9 11:51:10 2014 -0400 - - packet-hislip.c: Fix various bugs and deficiencies - - - Remove an incorrect call to conversation_new() - (which messed up TCP sequence number analysis). - - hislip Request/Response analysis must be done during 'pass1' - (i.e. when 'flags.visited == 0'); - Not doing so caused various problems including - tshark '1 pass' poor dissection. - - Remove 'if (tree)' around a call to expert_...(). - - Don't show "unknown" for Async/Sync when the value is actually known. - - Simplify some code. - - Mark a field as GENERATED. - - Change-Id: I286c12f52e5f73377bed3a2792f3ff0003e2785f - Reviewed-on: https://code.wireshark.org/review/3541 - Petri-Dish: Bill Meier <wmeier@newsguy.com> - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit e7301a15ab814e4070f918bba8561f291623faae) - Reviewed-on: https://code.wireshark.org/review/3543 - -commit e1c548e -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Aug 10 08:08:52 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-08-10] - - Change-Id: I18fca49b0ac3b5385805edb85151e5bb994a13f5 - Reviewed-on: https://code.wireshark.org/review/3532 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit 968c57d -Author: Evan Huus <eapache@gmail.com> -Date: Sat Aug 9 09:33:23 2014 -0400 - - Fix regression introduced by gf3b631668b - - I made a stupid when simplifying the bit-twiddling, and accidentally reversed - two of the bytes which completely broke MAC address name resolution. - - Bug: 10344 - Change-Id: I0720755fb290423150e4d84da9d45cb0b76341e4 - Reviewed-on: https://code.wireshark.org/review/3523 - Reviewed-by: Michael Mann <mmann78@netscape.net> - -commit 7579f8f -Author: MarkPhillips <mark.s.phillips@outlook.com> -Date: Sat Aug 9 11:03:01 2014 +0100 - - 802.11 BA sequence number decode is broken - - Bug: 10334 - Change-Id: If2da1c5ed63d7e2684a107181d56be38ed921106 - Reviewed-on: https://code.wireshark.org/review/3519 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - (cherry picked from commit 3035e6ec92b597169362387d7b8ca1efc3d8064c) - Reviewed-on: https://code.wireshark.org/review/3520 - -commit 6501534 -Author: Evan Huus <eapache@gmail.com> -Date: Thu Aug 7 20:25:34 2014 -0400 - - Fix read-past-end-of-buffer in CUPS dissector - - Even when the protocol specifies that a string ends in a null-terminator, there - are packets which won't. Therefore: - - **the result of tvb_get_ptr SHALL NOT be treated as a null-terminated string** - - We need to post that in big neon lettering somewhere obvious. - - Bug: 10353 - Change-Id: Ie30cd13353a9830311e573e734dd89dc07622c98 - Reviewed-on: https://code.wireshark.org/review/3486 - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit 95f8f55 -Author: Guy Harris <guy@alum.mit.edu> -Date: Thu Aug 7 17:21:13 2014 -0700 - - Put setargv.obj back in the list of objects for mergecap. - - This should enable automatic wildcard expansion and fix bug 10354. - - Add the usual setargv.obj comment for reordercap, which also links with - setargv.obj. - - Change-Id: If9c2b4ecf490dc263d3557a1cda24849a786d299 - Fixes-Bug: 10354 - Reviewed-on: https://code.wireshark.org/review/3484 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - -commit dbae90c -Author: AndersBroman <anders.broman@ericsson.com> -Date: Tue Aug 5 15:22:14 2014 +0200 - - Fix Bug #10348 Different dissection results for same file. - The fault is that reassembly_table_init() must be called when reloading - the file - move it to an init routine and register the init routine. - While there move the proto_register_opcua() routine to the end of the file - to be more consistent with other dissectors. - Change soft deprecated APIs - - Change-Id: I2b93692be24dbf60f4ef09aa7283e55ebf3c1874 - Reviewed-on: https://code.wireshark.org/review/3431 - Reviewed-by: Anders Broman <a.broman58@gmail.com> - (cherry picked from commit 79c55a34cb9869a846ed4e58a760c50e409eeeb5) - Reviewed-on: https://code.wireshark.org/review/3468 - -commit 28b65c0 -Author: Pascal Quantin <pascal.quantin@gmail.com> -Date: Wed Aug 6 19:50:06 2014 +0200 - - MIPv6: fix dissection of Service Selection Identifier - - APN field is not encoded as a dotted string so the first character is not a length - - Bug: 10323 - Change-Id: Ia62137c785d505e9d0f1536a333b421a85480741 - Reviewed-on: https://code.wireshark.org/review/3461 - Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - Reviewed-by: Anders Broman <a.broman58@gmail.com> - (cherry picked from commit ccbe5fd0b9520493884de70056dbd9682647ab8d) - Reviewed-on: https://code.wireshark.org/review/3467 - -commit 3cc3350 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Tue Aug 5 15:31:55 2014 -0400 - - Fix some dates in the changelog; add some recent changes to the changelog. - - Apparently rpmbuild now verifies the dates (including the day of the week) - you entered. - - Change-Id: I1c67fb3170de3199b5fe5f8c117eaefb4d4d28c7 - Reviewed-on: https://code.wireshark.org/review/3442 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - (cherry picked from commit b76e0f71aa9b9a4c2ff1242332d1919748e25bc3) - Reviewed-on: https://code.wireshark.org/review/3443 - -commit 7c06489 -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Fri Aug 1 14:51:53 2014 -0400 - - Remove the old wireshark binary during RPM upgrades. - - If we have a pre-alternatives wireshark binary out there (e.g., because - we're upgrading from wireshark-1.10 to wireshark-1.12), get rid of it - in the %pre script. Otherwise the binary gets left there (because it's - listed as a %ghost in the new spec file). - - Change-Id: I5828fcff486af3d269bad8dfe544c7659179bf5e - Reviewed-on: https://code.wireshark.org/review/3332 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - (cherry picked from commit c93297c750b99ac487f1f787896959ca43f64c72) - Reviewed-on: https://code.wireshark.org/review/3440 - -commit 5a329cb -Author: Bill Meier <wmeier@newsguy.com> -Date: Tue Aug 5 12:50:39 2014 -0400 - - Fix a few minor dissector bugs. - - Change-Id: If9a2cb3456e6262c6c255f5b64cbad9e9c70038f - Reviewed-on: https://code.wireshark.org/review/3433 - Petri-Dish: Bill Meier <wmeier@newsguy.com> - Reviewed-by: Bill Meier <wmeier@newsguy.com> - -commit 16bf5c5 -Author: Guy Harris <guy@alum.mit.edu> -Date: Mon Aug 4 16:04:06 2014 -0700 - - Squelch a compiler warning. - - Change-Id: I8916bb3cc136c03c39fbdaf5d7bb61c3dae137e6 - Reviewed-on: https://code.wireshark.org/review/3422 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit ce7b041305330e2cb87d895f57381241702c9d85) - Reviewed-on: https://code.wireshark.org/review/3423 - -commit 01b75b7 -Author: Guy Harris <guy@alum.mit.edu> -Date: Mon Aug 4 15:26:00 2014 -0700 - - Support both decimal and hex values for uint dissectors. - - And, while we're at it, reject entries with invalid numbers. - - Change-Id: Ifefe28396cfe391d2d5c7f7ff335d0f041e35a03 - Reviewed-on: https://code.wireshark.org/review/3417 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 01361a92cbb53d229fe927b9765dcd6c7999efb4) - Reviewed-on: https://code.wireshark.org/review/3418 - -commit 5d8d02e -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Mon Aug 4 15:44:02 2014 -0400 - - Fix RPM builds with a prefix other than /usr. - - The location of update-alternatives does not depend on Wireshark's - installation prefix: it's always in /usr/sbin/. - - Change-Id: I7dda9cebec83bc64133adfeb5ee6af70dc6dc7ab - Reviewed-on: https://code.wireshark.org/review/3413 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - (cherry picked from commit 644b2e7c69c5289b8a6f524aef84eb7c54cf6058) - Reviewed-on: https://code.wireshark.org/review/3414 - -commit becb4d7 -Author: Evan Huus <eapache@gmail.com> -Date: Fri Aug 1 21:27:01 2014 -0400 - - Only fake an item by returning 'tree' if they use the same TVB - - Otherwise the offsets will be wrong when calling, e.g. proto_item_set_end. - - Bug:10329 - Change-Id: I5ae0c660af90678e446817b65f83c075e7c0b84e - Reviewed-on: https://code.wireshark.org/review/3340 - Petri-Dish: Evan Huus <eapache@gmail.com> - Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit 087b6a6 -Author: Guy Harris <guy@alum.mit.edu> -Date: Sun Aug 3 23:59:10 2014 -0700 - - Some other places that needed buffer_ -> tagbuffer_. - - ("Namespaces" in C code - more fun than a barrel full of rabid monkeys on - crack.) - - Change-Id: Idb0fafd9c59c55407530f8626ecdc8edef33154b - Reviewed-on: https://code.wireshark.org/review/3404 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - -commit bb25002 -Author: Evan Huus <eapache@gmail.com> -Date: Sun Aug 3 20:30:52 2014 -0400 - - Try to detect overflow without causing signedness warnings. - - Change-Id: I957ead1f674e2c56e9c741841fea11395769b238 - Reviewed-on: https://code.wireshark.org/review/3398 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 0294b29527d7bb6315cb1097c47e57a362803495) - Reviewed-on: https://code.wireshark.org/review/3399 - -commit a413ca0 -Author: Evan Huus <eapache@gmail.com> -Date: Sun Aug 3 17:48:06 2014 -0400 - - Check for multiplicative overflow in the wmem_alloc_array macros. - - Bug:10343 - Change-Id: Iea511c806b92999b3b497f94886c46a818100a23 - Reviewed-on: https://code.wireshark.org/review/3396 - Reviewed-by: Bill Meier <wmeier@newsguy.com> - (cherry picked from commit efb8a1ee4319593dc14b8a42068f2cfddea1bff5) - Reviewed-on: https://code.wireshark.org/review/3397 - Reviewed-by: Evan Huus <eapache@gmail.com> - -commit b4fa306 -Author: Guy Harris <guy@alum.mit.edu> -Date: Sun Aug 3 13:53:58 2014 -0700 - - Remove duplicate line. - - Change-Id: I0b32ccaaa7c9e0294ee7bc96fe4937a98d8461d5 - Reviewed-on: https://code.wireshark.org/review/3394 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 6af06314576473c5d52844c9e2ee03c9455b50a3) - Reviewed-on: https://code.wireshark.org/review/3395 - -commit 072f532 -Author: Guy Harris <guy@alum.mit.edu> -Date: Thu Jul 31 01:56:51 2014 -0700 - - Missing end-of-line backslash. - - Change-Id: I99b72e4d38b12e0356f27d29f919484e40b7443b - Reviewed-on: https://code.wireshark.org/review/3287 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit acea064009473637487585fb0cefc774f8323d42) - Reviewed-on: https://code.wireshark.org/review/3393 - -commit b9dfdd3 -Author: Gerald Combs <gerald@wireshark.org> -Date: Sun Aug 3 08:08:51 2014 -0700 - - [Automatic manuf, services and enterprise-numbers update for 2014-08-03] - - Change-Id: I59fbca5004187ab8e0da653c37d93f358352c71f - Reviewed-on: https://code.wireshark.org/review/3381 - Reviewed-by: Gerald Combs <gerald@wireshark.org> - -commit 61abd97 -Author: Alexis La Goutte <alexis.lagoutte@gmail.com> -Date: Sat Aug 2 12:00:59 2014 +0200 - - HTTP2: Add a preference to enable/disable HTTP2 (weak) heuristics - - By default, the heuristic is disabled - - Change-Id: I26ef23e8b153576a4fabd2e3324e830756e64bb7 - Ping-Bug:10335 - Ping-Bug:10310 - Reviewed-on: https://code.wireshark.org/review/3350 - Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 0b23e0f91f1b3cce68dd2ff19058f41b0d93a7d4) - Reviewed-on: https://code.wireshark.org/review/3378 - -commit 6295e53 -Author: Evan Huus <eapache@gmail.com> -Date: Fri Aug 1 22:05:32 2014 -0400 - - Fix an infinite loop when the line has no length - - Bug:10333 - Change-Id: Ia2dae94095dddf57e4c75792b5477b0eb37c29c9 - Reviewed-on: https://code.wireshark.org/review/3344 - Reviewed-by: Anders Broman <a.broman58@gmail.com> - -commit 3b22920 -Author: moraney.jalil <moraney.jalil@outlook.com> -Date: Thu Jul 24 22:34:29 2014 +0300 - - Fixing a bug in add_ff_action_public_fields(), by removing the start argument and defining it inside the function. - - Change-Id: I6205384b3bcf38128912baf413b4455357d25347 - Reviewed-on: https://code.wireshark.org/review/3184 - Reviewed-by: Evan Huus <eapache@gmail.com> - (cherry picked from commit 0501465a3acb2abc108177ea5149ec8de4a05210) - Reviewed-on: https://code.wireshark.org/review/3361 - Reviewed-by: Anders Broman <a.broman58@gmail.com> - -commit 8562196 -Author: Martin Kaiser <wireshark@kaiser.cx> -Date: Fri Aug 1 12:32:21 2014 +0200 - - fix multi-byte entries in Operator Profile capability loops - (this problem showed up in an APDU with two 16bit application ids) - - Change-Id: Ie4842181b19db984a693534144fac5e91b217b34 - Reviewed-on: https://code.wireshark.org/review/3358 - Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> - Tested-by: Martin Kaiser <wireshark@kaiser.cx> - (cherry picked from commit b5f4cb5c33a0592f8debfe24311f0fccbd167e97) - Reviewed-on: https://code.wireshark.org/review/3359 - -commit 4936ea2 -Author: Guy Harris <guy@alum.mit.edu> -Date: Sat Aug 2 04:16:53 2014 -0700 - - Rename buffer_ routines to tagbuffer_ to avoid name collisions. - - In particular, collisions with the buffer_ routines in libwsutil; in the - trunk, we renamed *those* routines, but that breaks API/ABI - compatibility, so, in the 1.12 branch, we rename these routines, which - adds a difference between this code and the Lrexlib release that we'd - rather not have if we can avoid it. - - This should fix bug 10332. - - Change-Id: Ib37a50713acb880fb79adacc91f7bb49959be97e - Reviewed-on: https://code.wireshark.org/review/3352 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - -commit e2f1fa6 -Author: Jeff Morriss <morriss@ulticom.com> -Date: Fri Aug 1 10:32:58 2014 -0400 - - Fix a couple debian dist files which are different for master-1.12. - - Bug: 10331 - Change-Id: If4b1269eef1cb1deb01c1ad5f402a4a19910d88f - Reviewed-on: https://code.wireshark.org/review/3321 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit 76c9d88 -Author: Guy Harris <guy@alum.mit.edu> -Date: Thu Jul 31 00:41:08 2014 -0700 - - Add a bunch of missing files to the distribution. - - Files from the debian directory, documents from the doc directory, - graphics from the docbook/wsug_graphics directory, and the echld - Makefile.nmake. - - Bug: 10331 - Change-Id: Iccccc58811753581b0b180053defd937aea22f95 - Reviewed-on: https://code.wireshark.org/review/3283 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - Reviewed-on: https://code.wireshark.org/review/3320 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit ffe97f8 -Author: Evan Huus <eapache@gmail.com> -Date: Thu Jul 31 13:18:21 2014 -0400 - - Use packet_scope instead of a stack local - - As clang pointed out we end up storing a reference to it in a global and (more - relevantly) pushing that global to a tap which would run after the current frame - has returned. - - Thanks to Alexis for bringing this to my attention. - - Change-Id: I3aac43a806d217b0dc8a973f6bb2fa48cdd041bb - Reviewed-on: https://code.wireshark.org/review/3289 - Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> - Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> - Reviewed-by: Anders Broman <a.broman58@gmail.com> - (cherry picked from commit a644744fb9502971fee751b8a1e390d255b82d78) - Reviewed-on: https://code.wireshark.org/review/3310 - Reviewed-by: Michael Mann <mmann78@netscape.net> - -commit b03c8af -Author: Jeff Morriss <jeff.morriss.ws@gmail.com> -Date: Fri Aug 1 10:08:38 2014 -0400 - - Add wireshark.pc.in to the source distribution (needed for cmake). - - Bug: 10331 - Change-Id: I81e0d224917cd4b38215e28ec146cd80efdb99d2 - Reviewed-on: https://code.wireshark.org/review/3316 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - (cherry picked from commit 7f9fdbb8c10522d2bc31d285d1486601a441f09d) - Reviewed-on: https://code.wireshark.org/review/3317 - -commit 506e8f6 -Author: Guy Harris <guy@alum.mit.edu> -Date: Wed Jul 30 16:41:51 2014 -0700 - - Add some files under asn1 to the distribution. - - Include CMakeLists.txt files and the gnm subdirectory, along with the - top-level Makefile.inc and Makefile.preinc files. Don't explicitly - include Custom.make, as automake does that automatically given that it's - included by asn1/Makefile.am. - - Add some files to EXTRA_DIST lists. - - Move some .asn files to EXTRA_DIST; they don't need to be in SRC_FILES, - as SRC_FILES always includes EXTRA_DIST, and they *do* need to be in - EXTRA_DIST so that they're in the distribution. - - Bug: 10331 - Change-Id: Id91df577260fa57028d40fe098be1d79c59398e6 - Reviewed-on: https://code.wireshark.org/review/3273 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 4d90d6e38d1afaeda387dea9522cc0417ff41141) - Reviewed-on: https://code.wireshark.org/review/3315 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit 0ef5faf -Author: Guy Harris <guy@alum.mit.edu> -Date: Wed Jul 30 21:45:19 2014 -0700 - - Add some missing CMake files to the distribution. - - Ping-Bug: 10331 - Change-Id: I67ca59bb77766f4625e64b9042cdcb5d03cd7994 - Reviewed-on: https://code.wireshark.org/review/3281 - Reviewed-by: Guy Harris <guy@alum.mit.edu> - (cherry picked from commit 5dd83af26d2a035bbe94fd453d2093e8504f2685) - Reviewed-on: https://code.wireshark.org/review/3314 - Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com> - -commit 3d8fb9c -Author: Gerald Combs <gerald@wireshark.org> -Date: Thu Jul 31 15:33:59 2014 -0700 - - 1.12.0 → 1.12.1. - - Change-Id: I059be7c092f52f5f7d3a29357abd8c9b05204905 - Reviewed-on: https://code.wireshark.org/review/3306 - Reviewed-by: Gerald Combs <gerald@wireshark.org> @@ -1,4 +1,4 @@ - Wireshark 1.12.1 Release Notes + Wireshark 1.12.2 Release Notes __________________________________________________________ What is Wireshark? @@ -15,70 +15,10 @@ What's New The following bugs have been fixed: The following vulnerabilities have been fixed. - * [1]wnpa-sec-2014-13 - MEGACO dissector infinite loop. ([2]Bug 10333) - [3]CVE-2014-6423 - * [4]wnpa-sec-2014-14 - Netflow dissector crash. ([5]Bug 10370) [6]CVE-2014-6424 - * [7]wnpa-sec-2014-15 - CUPS dissector crash. ([8]Bug 10353) [9]CVE-2014-6425 - * [10]wnpa-sec-2014-16 - HIP dissector infinite loop. [11]CVE-2014-6426 - * [12]wnpa-sec-2014-17 - RTSP dissector crash. ([13]Bug 10381) [14]CVE-2014-6427 - * [15]wnpa-sec-2014-18 - SES dissector crash. ([16]Bug 10454) [17]CVE-2014-6428 - * [18]wnpa-sec-2014-19 - Sniffer file parser crash. ([19]Bug 10461) - [20]CVE-2014-6429 [21]CVE-2014-6430 [22]CVE-2014-6431 - [23]CVE-2014-6432 + * [1]wnpa-sec-2014-20 + A dissector went awry. (ws-buglink:XXX[]) The following bugs have been fixed: - * Wireshark can crash during remote capture (rpcap) - configuration. ([24]Bug 3554, [25]Bug 6922, - ws-buglink:7021) - * 802.11 capture does not decrypt/decode DHCP response. - ([26]Bug 8734) - * Extra quotes around date fields (FT_ABSOLUTE_TIME) when - using -E quote=d or s. ([27]Bug 10213) - * No progress line in "VOIP RTP Player". ([28]Bug 10307) - * MIPv6 Service Selection Identifier parse error. ([29]Bug - 10323) - * Probably wrong length check in proto_item_set_end. ([30]Bug - 10329) - * 802.11 BA sequence number decode is broken. ([31]Bug 10334) - * wmem_alloc_array() "succeeds" (and clobbers memory) when - requested to allocate 0xaaaaaaaa items of size 12. ([32]Bug - 10343) - * Different dissection results for same file. ([33]Bug 10348) - * Mergecap wildcard breaks in version 1.12.0. ([34]Bug 10354) - * Diameter TCP reassemble. ([35]Bug 10362) - * TRILL NLPID 0xc0 unknown to Wireshark. ([36]Bug 10382) - * BTLE advertising header flags (RxAdd/TxAdd) dissected - incorrectly. ([37]Bug 10384) - * Ethernet OAM (CFM) frames including TLV's are wrongly - decoded as malformed. ([38]Bug 10385) - * BGP4: Wireshark skipped some potion of AS_PATH. ([39]Bug - 10399) - * MAC address name resolution is broken. ([40]Bug 10344) - * Wrong decoding of RPKI RTR End of Data PDU. ([41]Bug 10411) - * SSL/TLS dissector incorrectly interprets length for - status_request_v2 hello extension. ([42]Bug 10416) - * Misparsed NTP control assignments with empty values. - ([43]Bug 10417) - * 6LoWPAN multicast address decompression problems. ([44]Bug - 10426) - * Netflow v9 flowset not decoded if options template has - zero-length scope section. ([45]Bug 10432) - * GUI Hangs when Selecting Path to GeoIP Files. ([46]Bug - 10434) - * AX.25 dissector prints unprintable characters. ([47]Bug - 10439) - * 6LoWPAN context handling not working. ([48]Bug 10443) - * SIP: When export to a CSV, Info is changed to differ. - ([49]Bug 10453) - * Typo in packet-netflow.c. ([50]Bug 10458) - * Incorrect MPEG-TS decoding (OPCR field). ([51]Bug 10446) New and Updated Features @@ -90,28 +30,21 @@ What's New Updated Protocol Support - 6LoWPAN, A21, ACR122, Art-Net, AX.25, BGP, BTLE, CAPWAP, - DIAMETER, DICOM, DVB-CI, Ethernet OAM, HIP, HiSLIP, HTTP2, IEEE - 802.11, MAUSB, MEGACO, MIPv6, MP2T, Netflow, NTP, openSAFETY, - OSI, RDM, RPKI RTR, RTSP, SES, SIP, TLS, and Token Ring MAC - New and Updated Capture File Support - - DOS Sniffer, and NetScaler __________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available - from [52]http://www.wireshark.org/download.html. + from [2]http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list - of third-party packages can be found on the [53]download page - on the Wireshark web site. + of third-party packages can be found on the [3]download page on + the Wireshark web site. __________________________________________________________ File Locations @@ -124,127 +57,77 @@ File Locations Known Problems - Dumpcap might not quit if Wireshark or TShark crashes. ([54]Bug + Dumpcap might not quit if Wireshark or TShark crashes. ([4]Bug 1419) - The BER dissector might infinitely loop. ([55]Bug 1516) + The BER dissector might infinitely loop. ([5]Bug 1516) Capture filters aren't applied when capturing from named pipes. (ws-buglink:1814) Filtering tshark captures with read filters (-R) no longer - works. ([56]Bug 2234) + works. ([6]Bug 2234) The 64-bit Windows installer does not support Kerberos - decryption. ([57]Win64 development page) + decryption. ([7]Win64 development page) - Resolving ([58]Bug 9044) reopens ([59]Bug 3528) so that - Wireshark no longer automatically decodes gzip data when - following a TCP stream. + Resolving ([8]Bug 9044) reopens ([9]Bug 3528) so that Wireshark + no longer automatically decodes gzip data when following a TCP + stream. - Application crash when changing real-time option. ([60]Bug + Application crash when changing real-time option. ([10]Bug 4035) - Hex pane display issue after startup. ([61]Bug 4056) + Hex pane display issue after startup. ([11]Bug 4056) - Packet list rows are oversized. ([62]Bug 4357) + Packet list rows are oversized. ([12]Bug 4357) Summary pane selected frame highlighting not maintained. - ([63]Bug 4445) + ([13]Bug 4445) Wireshark and TShark will display incorrect delta times in some - cases. ([64]Bug 4985) + cases. ([14]Bug 4985) The 64-bit Mac OS X installer doesn't support Mac OS X 10.9 - ([65]Bug 9242) + ([15]Bug 9242) __________________________________________________________ Getting Help - Community support is available on [66]Wireshark's Q&A site and + Community support is available on [16]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found - on [67]the web site. + on [17]the web site. Official Wireshark training and certification are available - from [68]Wireshark University. + from [18]Wireshark University. __________________________________________________________ Frequently Asked Questions - A complete FAQ is available on the [69]Wireshark web site. + A complete FAQ is available on the [19]Wireshark web site. __________________________________________________________ - Last updated 2014-09-16 08:49:14 PDT + Last updated 2014-09-16 12:45:46 PDT References - 1. https://www.wireshark.org/security/wnpa-sec-2014-13.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10333 - 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423 - 4. https://www.wireshark.org/security/wnpa-sec-2014-14.html - 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10370 - 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424 - 7. https://www.wireshark.org/security/wnpa-sec-2014-15.html - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10353 - 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425 - 10. https://www.wireshark.org/security/wnpa-sec-2014-16.html - 11. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426 - 12. https://www.wireshark.org/security/wnpa-sec-2014-17.html - 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381 - 14. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427 - 15. https://www.wireshark.org/security/wnpa-sec-2014-18.html - 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10454 - 17. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428 - 18. https://www.wireshark.org/security/wnpa-sec-2014-19.html - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461 - 20. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429 - 21. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430 - 22. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431 - 23. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3554 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6922 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8734 - 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10213 - 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10307 - 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10323 - 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10329 - 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10334 - 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10343 - 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10348 - 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10354 - 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10362 - 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10382 - 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10384 - 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10385 - 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10399 - 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10344 - 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10411 - 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10416 - 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10417 - 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10426 - 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10432 - 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10434 - 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10439 - 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10443 - 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10453 - 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10458 - 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10446 - 52. http://www.wireshark.org/download.html - 53. http://www.wireshark.org/download.html#thirdparty - 54. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 - 55. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 - 56. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 - 57. https://wiki.wireshark.org/Development/Win64 - 58. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 - 59. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 - 60. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 - 61. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 - 62. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 - 63. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445 - 64. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 - 65. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9242 - 66. http://ask.wireshark.org/ - 67. http://www.wireshark.org/lists/ - 68. http://www.wiresharktraining.com/ - 69. http://www.wireshark.org/faq.html + 1. https://www.wireshark.org/security/wnpa-sec-2014-20.html + 2. http://www.wireshark.org/download.html + 3. http://www.wireshark.org/download.html#thirdparty + 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 7. https://wiki.wireshark.org/Development/Win64 + 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 + 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 + 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 + 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 + 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445 + 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9242 + 16. http://ask.wireshark.org/ + 17. http://www.wireshark.org/lists/ + 18. http://www.wiresharktraining.com/ + 19. http://www.wireshark.org/faq.html diff --git a/config.nmake b/config.nmake index 84eeac2ab2..d860692b2d 100644 --- a/config.nmake +++ b/config.nmake @@ -35,7 +35,7 @@ GIT_REVISION=0 # Updated by make-version.pl VERSION_MAJOR=1 VERSION_MINOR=12 -VERSION_MICRO=1 +VERSION_MICRO=2 VERSION_BUILD=$(GIT_REVISION) # Local build information. Recommended: Unique string for your diff --git a/configure.ac b/configure.ac index d65ffc90b1..080fbcfa33 100644 --- a/configure.ac +++ b/configure.ac @@ -7,7 +7,7 @@ # m4_define([version_major], [1]) m4_define([version_minor], [12]) -m4_define([version_micro], [1]) +m4_define([version_micro], [2]) m4_define([version_micro_extra], version_micro) m4_append([version_micro_extra], []) diff --git a/debian/changelog b/debian/changelog index 1b6d465655..3ea556338a 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,4 +1,4 @@ -wireshark (1.12.1) unstable; urgency=low +wireshark (1.12.2) unstable; urgency=low * Self-made package diff --git a/docbook/asciidoc.conf b/docbook/asciidoc.conf index d82c0cdb7b..d37bca74bd 100644 --- a/docbook/asciidoc.conf +++ b/docbook/asciidoc.conf @@ -4,7 +4,7 @@ # Yes, these are fake macros. # We should probably replace some or all of them with attributes. -wireshark-version:\[\]=1.12.1 +wireshark-version:\[\]=1.12.2 wireshark-major-minor-version:\[\]=1.12 wireshark-authors-url:\[\]=http://www.wireshark.org/about.html#authors diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc index c18566085f..0e1787007a 100644 --- a/docbook/release-notes.asciidoc +++ b/docbook/release-notes.asciidoc @@ -15,68 +15,14 @@ The following bugs have been fixed: The following vulnerabilities have been fixed. -* ws-salink:2014-13[] +* ws-salink:2014-20[] + -MEGACO dissector infinite loop. -// Fixed in master: g9112a09 -// Fixed in master-1.12: g6295e53 -// Fixed in master-1.10: gfeed72f -(ws-buglink:10333[]) -cve-idlink:2014-6423[] - -* ws-salink:2014-14[] -+ -Netflow dissector crash. -// Fixed in master: g4469825 -// Fixed in master-1.12: g2035d31 -// Fixed in master-1.10: g6e67016 -(ws-buglink:10370[]) -cve-idlink:2014-6424[] - -* ws-salink:2014-15[] -+ -CUPS dissector crash. -// Fixed in master: gc10396d -// Fixed in master-1.12: g2035d31 -(ws-buglink:10353[]) -cve-idlink:2014-6425[] - -* ws-salink:2014-16[] -+ -HIP dissector infinite loop. -// Fixed in master: gd9e5021 -// Fixed in master-1.12: g9069d7b -cve-idlink:2014-6426[] - -* ws-salink:2014-17[] -+ -RTSP dissector crash. -// Fixed in master: g7395915 -// Fixed in master-1.12: g949cca0 -// Fixed in master-1.10: gd762bd3 -(ws-buglink:10381[]) -cve-idlink:2014-6427[] - -* ws-salink:2014-18[] -+ -SES dissector crash. -// Fixed in master: g433a444 -// Fixed in master-1.12: g0942b2c -// Fixed in master-1.10: g6763e8d -(ws-buglink:10454[]) -cve-idlink:2014-6428[] - -* ws-salink:2014-19[] -+ -Sniffer file parser crash. -// Fixed in master: g47c5929 -// Fixed in master-1.12: g4413725 -// Fixed in master-1.10: g9a7abcc -(ws-buglink:10461[]) -cve-idlink:2014-6429[] -cve-idlink:2014-6430[] -cve-idlink:2014-6431[] -cve-idlink:2014-6432[] +A dissector went awry. +// Fixed in master: gXXX +// Fixed in master-1.12: gXXX +// Fixed in master-1.10: gXXX +(ws-buglink:XXX[]) +//cve-idlink:2014-XXX[] The following bugs have been fixed: @@ -84,66 +30,6 @@ The following bugs have been fixed: //* Wireshark always manages to score tickets for Burning Man, Coachella, and // SXSW while you end up working double shifts. (ws-buglink:0000[]) -* Wireshark can crash during remote capture (rpcap) configuration. - (ws-buglink:3554[], ws-buglink:6922[], ws-buglink:7021) - -* 802.11 capture does not decrypt/decode DHCP response. (ws-buglink:8734[]) - -* Extra quotes around date fields (FT_ABSOLUTE_TIME) when using -E quote=d or s. (ws-buglink:10213[]) - -* No progress line in "VOIP RTP Player". (ws-buglink:10307[]) - -* MIPv6 Service Selection Identifier parse error. (ws-buglink:10323[]) - -* Probably wrong length check in proto_item_set_end. (ws-buglink:10329[]) - -* 802.11 BA sequence number decode is broken. (ws-buglink:10334[]) - -* wmem_alloc_array() "succeeds" (and clobbers memory) when requested to allocate - 0xaaaaaaaa items of size 12. (ws-buglink:10343[]) - -* Different dissection results for same file. (ws-buglink:10348[]) - -* Mergecap wildcard breaks in version 1.12.0. (ws-buglink:10354[]) - -* Diameter TCP reassemble. (ws-buglink:10362[]) - -* TRILL NLPID 0xc0 unknown to Wireshark. (ws-buglink:10382[]) - -* BTLE advertising header flags (RxAdd/TxAdd) dissected incorrectly. - (ws-buglink:10384[]) - -* Ethernet OAM (CFM) frames including TLV's are wrongly decoded as malformed. - (ws-buglink:10385[]) - -* BGP4: Wireshark skipped some potion of AS_PATH. (ws-buglink:10399[]) - -* MAC address name resolution is broken. (ws-buglink:10344[]) - -* Wrong decoding of RPKI RTR End of Data PDU. (ws-buglink:10411[]) - -* SSL/TLS dissector incorrectly interprets length for status_request_v2 hello - extension. (ws-buglink:10416[]) - -* Misparsed NTP control assignments with empty values. (ws-buglink:10417[]) - -* 6LoWPAN multicast address decompression problems. (ws-buglink:10426[]) - -* Netflow v9 flowset not decoded if options template has zero-length scope - section. (ws-buglink:10432[]) - -* GUI Hangs when Selecting Path to GeoIP Files. (ws-buglink:10434[]) - -* AX.25 dissector prints unprintable characters. (ws-buglink:10439[]) - -* 6LoWPAN context handling not working. (ws-buglink:10443[]) - -* SIP: When export to a CSV, Info is changed to differ. (ws-buglink:10453[]) - -* Typo in packet-netflow.c. (ws-buglink:10458[]) - -* Incorrect MPEG-TS decoding (OPCR field). (ws-buglink:10446[]) - === New and Updated Features There are no new features in this release. @@ -155,44 +41,11 @@ There are no new protocols in this release. === Updated Protocol Support --sort-and-group-- -6LoWPAN -A21 -ACR122 -Art-Net -AX.25 -BGP -BTLE -CAPWAP -Ethernet OAM -DIAMETER -DICOM -DVB-CI -HIP -HiSLIP -HTTP2 -IEEE 802.11 -MAUSB -MEGACO -MIPv6 -MP2T -Netflow -NTP -openSAFETY -OSI -RDM -RPKI RTR -RTSP -SES -SIP -TLS -Token Ring MAC --sort-and-group-- === New and Updated Capture File Support --sort-and-group-- -DOS Sniffer -NetScaler --sort-and-group-- == Getting Wireshark diff --git a/epan/Makefile.am b/epan/Makefile.am index 5173cefb54..1fd67fb1ab 100644 --- a/epan/Makefile.am +++ b/epan/Makefile.am @@ -54,7 +54,7 @@ ACLOCAL_AMFLAGS = `../aclocal-flags` noinst_LTLIBRARIES = libwireshark_generated.la libwireshark_asmopt.la lib_LTLIBRARIES = libwireshark.la # http://www.gnu.org/software/libtool/manual/html_node/Updating-version-info.html -libwireshark_la_LDFLAGS = -version-info 5:1:0 @LDFLAGS_SHAREDLIB@ +libwireshark_la_LDFLAGS = -version-info 5:2:0 @LDFLAGS_SHAREDLIB@ include Makefile.common diff --git a/filetap/Makefile.am b/filetap/Makefile.am index 4fe9045bcd..57d852a5d8 100644 --- a/filetap/Makefile.am +++ b/filetap/Makefile.am @@ -27,7 +27,7 @@ include Makefile.common lib_LTLIBRARIES = libfiletap.la # http://www.gnu.org/software/libtool/manual/html_node/Updating-version-info.html -libfiletap_la_LDFLAGS = -version-info 0:1:0 @LDFLAGS_SHAREDLIB@ +libfiletap_la_LDFLAGS = -version-info 0:2:0 @LDFLAGS_SHAREDLIB@ AM_NON_GENERATED_CFLAGS =-DWS_BUILD_DLL diff --git a/make-version.pl b/make-version.pl index e13f50856a..74aebb8295 100755 --- a/make-version.pl +++ b/make-version.pl @@ -76,7 +76,7 @@ my $set_release = 0; my %version_pref = ( "version_major" => 1, "version_minor" => 12, - "version_micro" => 1, + "version_micro" => 2, "version_build" => 0, "enable" => 1, diff --git a/version.conf b/version.conf index 9480b2f829..6dedd7c96a 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add a "rc" to the version. -#enable: 1 -#pkg_format: rc0-%# -#pkg_enable: 1 +enable: 1 +pkg_format: rc0-%# +pkg_enable: 1 # Final release: Disable package version stamps. -enable: 1 -pkg_format: -pkg_enable: 0 +#enable: 1 +#pkg_format: +#pkg_enable: 0 diff --git a/wiretap/Makefile.am b/wiretap/Makefile.am index 30217156b1..b7ff1b54ff 100644 --- a/wiretap/Makefile.am +++ b/wiretap/Makefile.am @@ -28,7 +28,7 @@ include Makefile.common noinst_LTLIBRARIES = libwiretap_generated.la lib_LTLIBRARIES = libwiretap.la # http://www.gnu.org/software/libtool/manual/html_node/Updating-version-info.html -libwiretap_la_LDFLAGS = -version-info 4:1:0 @LDFLAGS_SHAREDLIB@ +libwiretap_la_LDFLAGS = -version-info 4:2:0 @LDFLAGS_SHAREDLIB@ AM_NON_GENERATED_CFLAGS =-DWS_BUILD_DLL |