aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--ChangeLog583
-rw-r--r--NEWS131
-rw-r--r--docbook/release-notes.asciidoc12
-rw-r--r--version.conf12
4 files changed, 692 insertions, 46 deletions
diff --git a/ChangeLog b/ChangeLog
index e69de29bb2..ba1a456bec 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -0,0 +1,583 @@
+commit 9f202e4
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Mon Jul 17 16:06:28 2017 -0700
+
+ Prep for 2.0.14.
+
+ Change-Id: If869241874c1d741aad8e8198193eaf497ed0bda
+ Reviewed-on: https://code.wireshark.org/review/22682
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit a83a324
+Author: Michael Mann <mmann78@netscape.net>
+Date: Sat Jun 17 11:33:29 2017 -0400
+
+ OpenSafety: sanity check calculated length.
+
+ Original sanity check was missed for fragmentation
+
+ Bug: 13755
+ Change-Id: If9e24e01a119c869b02f198456776c8e6c6f2ad0
+ Reviewed-on: https://code.wireshark.org/review/22193
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Roland Knall <rknall@gmail.com>
+ (cherry picked from commit 66c50585e5c10764d0b8a850fd49fa7012346560)
+ Reviewed-on: https://code.wireshark.org/review/22680
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 903300e
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jul 16 17:33:21 2017 +0000
+
+ [Automatic update for 2017-07-16]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ia88592416ced2d27684b6b389ce1adeedec67976
+ Reviewed-on: https://code.wireshark.org/review/22650
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 3c65b5e
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Wed Jul 5 10:05:04 2017 +0200
+
+ UMTS RLC: check rlc_channel_assign return value when searching duplicates
+
+ Bug: 13871
+ Change-Id: Id28d73115b557af96c23154a18dcee502b4305ed
+ Reviewed-on: https://code.wireshark.org/review/22520
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 9ff673d3e85590141a6f0e33c9521de91512094d)
+ Conflicts:
+ epan/dissectors/packet-umts_rlc.c
+ Reviewed-on: https://code.wireshark.org/review/22527
+
+commit 92f8601
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Wed Jul 5 10:19:08 2017 +0200
+
+ UMTS FP: do not try to compute CRC on payload when no payload is present
+
+ A call to tvb_memdup() with a 0 length triggers a UBSan warning
+
+ Change-Id: I6c99ef85050cd2219d2135f64f747961a8be6927
+ Ping-Bug: 13871
+ Reviewed-on: https://code.wireshark.org/review/22521
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 02f66afd64753c6b177ba21c46bdf938d682afe4)
+ Reviewed-on: https://code.wireshark.org/review/22524
+
+commit 8c91d8e
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jul 1 05:17:23 2017 +0000
+
+ Revert "dumpcap: fix minor memory leak at begin of capture"
+
+ This reverts commit 4b40cee433172d061e45c9ddfdadae50bfbdcd10.
+
+ There's no cpu_info_str to *be* leaked in this branch.
+
+ Change-Id: I83af74b00a5903eeefb2af0510ee1341f337f094
+ Reviewed-on: https://code.wireshark.org/review/22492
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 4b40cee
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Fri Jun 30 00:32:25 2017 +0200
+
+ dumpcap: fix minor memory leak at begin of capture
+
+ While "os_info_str" is freed after the loop, "cpu_info_str" was leaked.
+
+ Change-Id: Ia4069403c0a5dd5cc6bd7ed61726c1bfa9736b19
+ Reviewed-on: https://code.wireshark.org/review/22465
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 247446539704aee99f64e73a77e5e88a40ae885a)
+ Reviewed-on: https://code.wireshark.org/review/22470
+
+commit 2787642
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jun 27 18:44:39 2017 -0700
+
+ Clean up the "non-constant initalizers" stuff.
+
+ We aren't, in this branch, insisting on C99 on UN*X, so we still warn
+ against initializing aggregates, even if they have automatic storage
+ duration, with non-constant values. Put that into its own section, with
+ some details, and take that out of the section on initializing global
+ and static variables with non-constant values.
+
+ (In practice, it'll probably Just Work, but we haven't pulled any of the
+ *other* C99isms into this branch, and this branch is soon going to be
+ less active once 2.4 is out, so we'll just leave the restrictions in.)
+
+ For the latter section, expand the example in the hopes of avoiding
+ confusion between "static storage duration" (which something declared
+ "static" has, but which anything declared with file scope, whether
+ declared "static" or not, also has) and "static storage duration and
+ internal linkage", which is what the "static" keyword specifies.
+
+ Change-Id: I5a7d307f0cb3be84e355b92231fb115359d0cd41
+ Reviewed-on: https://code.wireshark.org/review/22436
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 0930fe4cffc3f9b4a8ef9168a72fdb05c8f1bcb8)
+ Reviewed-on: https://code.wireshark.org/review/22437
+
+commit e0b028f
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jun 27 14:35:20 2017 -0700
+
+ Fix the "don't initialize with non-constant variables" item.
+
+ It only applies to variables with static storage duration, i.e. global
+ and static variables. Expand the example of how to do it, to make it a
+ bit clearer.
+
+ Change-Id: Ie0c473a35a77351dd10d6c9df2c34a39f077fca4
+ Reviewed-on: https://code.wireshark.org/review/22430
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 7321df2a4532d6531eab75f99c5f158ffd90574b)
+ Reviewed-on: https://code.wireshark.org/review/22433
+
+commit 77a3732
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jun 26 18:48:01 2017 -0700
+
+ Don't check for inflatePrime() on Windows.
+
+ On Windows, we build libz as part of the Wireshark build process, so we
+ don't necessarily *have* a libz library to search or inflatePrime() at
+ this point; the search fails on the buildbots, for example.
+
+ So, on Windows, we just assume we have a new enough version of libz, so
+ that it has inflatePrime().
+
+ Bug: 13850
+ Change-Id: Ied0909f4a591ff3312d83a2a2ed41e3cd12218e8
+ Reviewed-on: https://code.wireshark.org/review/22413
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 9a1d16b55324056e4d5031370b007097b76dc519)
+ Reviewed-on: https://code.wireshark.org/review/22416
+
+commit 3837aa7
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 25 08:24:00 2017 +0000
+
+ [Automatic update for 2017-06-25]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: I67970f2016f4ac63a15a1815a27a0b496dcf516f
+ Reviewed-on: https://code.wireshark.org/review/22387
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit aecad01
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Wed Jun 21 23:25:24 2017 +0200
+
+ OSPF: fix Opaque LSA Type 11 is considered as unknown
+
+ it is define in RFC5250 (and RFC 2370)
+
+ Ping-Bug: 13823
+
+ Change-Id: I84f166d48b39e76ab811a6c2d1c7b1d516e7f0f3
+ Reviewed-on: https://code.wireshark.org/review/22328
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 0727123773d36a9dd6000d82a2967f7ddaa61aca)
+ Reviewed-on: https://code.wireshark.org/review/22372
+
+commit bce386e
+Author: Dirk Weise <code@dirk-weise.de>
+Date: Thu Jun 22 10:16:17 2017 +0200
+
+ Add notes about predefined strings not available to plugins
+
+ The documention refers dissector authors to helpful predifined string structures
+ that plugin authors unfortunately cannot use.
+
+ # Conflicts:
+ # doc/README.dissector
+
+ Bug: 13828
+ Change-Id: I62cdfeb200c9b354aed44d40c80a0e8f9e8f910b
+ Reviewed-on: https://code.wireshark.org/review/22339
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Reviewed-on: https://code.wireshark.org/review/22343
+ Reviewed-on: https://code.wireshark.org/review/22344
+
+commit 0a48660
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Jun 22 02:13:52 2017 +0200
+
+ MQ: put declaration before code
+
+ Change-Id: I2b0d1a4795e3278a1702d51d4fd532a37a4eba19
+ Reviewed-on: https://code.wireshark.org/review/22332
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit e46cb2defc559a530d11689d50f0adf47513e8e5)
+ Reviewed-on: https://code.wireshark.org/review/22335
+
+commit 8d9a0e9
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Wed Jun 21 14:43:04 2017 +0200
+
+ ISIS LSP: fix wrong bitmask for SPVID
+
+ Issue reported by Bo-Han Liao
+
+ Bug: 13821
+ Change-Id: I74641bef723e747bfe5fa87e946b7f4f74b94bf6
+ Reviewed-on: https://code.wireshark.org/review/22299
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 855484fbd98c8c01f5a84902243389e07e32b6e9)
+ Reviewed-on: https://code.wireshark.org/review/22302
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 000b206
+Author: Roland Knall <rknall@gmail.com>
+Date: Tue Jun 20 16:10:42 2017 -0400
+
+ tcp: Change the wording to include (s)
+
+ More than one packet could be meant by that
+
+ Change-Id: Ie751a282c927608414673c2cd48b11dc5e6d5ea6
+ Reviewed-on: https://code.wireshark.org/review/22283
+ Reviewed-by: Roland Knall <rknall@gmail.com>
+ Petri-Dish: Roland Knall <rknall@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 050da447424223d39d1e494b8daab840a100d05e)
+ Reviewed-on: https://code.wireshark.org/review/22297
+
+commit 57b83bb
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Tue Jun 20 21:31:49 2017 +0200
+
+ GPRS LLC: fix a variable overflow when decoding XID
+
+ Bug: 13603
+ Change-Id: I135c5d6a9edff53ed4b7aa283c7293e22bd377e6
+ Reviewed-on: https://code.wireshark.org/review/22276
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 8fcd725
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Mon Jun 19 20:40:52 2017 +0200
+
+ MQ: check fragment length before trying to perform reassembly
+
+ Bug: 13792
+ Change-Id: Id0c116655288c5a3347911281a932ae80250c24f
+ Reviewed-on: https://code.wireshark.org/review/22233
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit bb58b3a2643ab81560d84b00be3a9b9e86f0393c)
+ Conflicts:
+ epan/dissectors/packet-mq.c
+ Reviewed-on: https://code.wireshark.org/review/22253
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 0ba332e
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Mon Jun 19 20:06:06 2017 +0200
+
+ PROFINET IO: define an arbitrary recursion depth limit
+
+ Bug: 13811
+ Change-Id: I52bffd4a79dcdad9da23f33e1fc6a868472390bf
+ Reviewed-on: https://code.wireshark.org/review/22232
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit fbfb87a2439dd18f2318586b8e5a2f6db410ba6a)
+ Reviewed-on: https://code.wireshark.org/review/22256
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit e57c86e
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Mon Jun 19 21:23:47 2017 +0200
+
+ AMQP: fix a stack overflow when offset goes back and forth
+
+ Previous code assumed that list decoding was successful and that some
+ bytes were consumed. Let's explicitly check this.
+
+ Bug: 13780
+ Change-Id: I3546b093f309f2b8096f01bc9987ac5ad9e029eb
+ Reviewed-on: https://code.wireshark.org/review/22235
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 246cbbc2ea6dd0a3a69a1aaa94db244a77565353)
+ Reviewed-on: https://code.wireshark.org/review/22250
+
+commit 891d531
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Sun Jun 18 22:16:42 2017 +0200
+
+ DAAP: define an arbitrary recursion depth limit
+
+ Bug: 13799
+ Change-Id: I611e3e888f91f78262e0d685e613a2bc221687c5
+ Reviewed-on: https://code.wireshark.org/review/22210
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 82fc557bed30b1aa69ca43a4291b64a9ce54c78a)
+ Conflicts:
+ epan/dissectors/packet-daap.c
+ Reviewed-on: https://code.wireshark.org/review/22231
+
+commit 195fb99
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Jun 18 19:55:11 2017 -0700
+
+ Put the definition of BIT_SWAPPED_MAC_ADDRS in the file where it's used.
+
+ In change 18a3b0659c209a2e0121eacd640b75e6c1c3b87d, I moved the table
+ that uses it, but not the actual definition, from libpcap.c to
+ pcap-common.c; they both should have been moved. Make it so.
+
+ Change-Id: I266fce455df3848b873cdfadb12cecdbf9c8d4d3
+ Reviewed-on: https://code.wireshark.org/review/22216
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit e9e1b4816278a131aa38dfc579ccd975fed2d7c7)
+ Reviewed-on: https://code.wireshark.org/review/22219
+
+commit 48cdd49
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 18 08:38:46 2017 +0000
+
+ [Automatic update for 2017-06-18]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: Ib19f0a1ee301aca47b4dde911150525fe8135dfa
+ Reviewed-on: https://code.wireshark.org/review/22206
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 02e6264
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Jun 16 11:40:22 2017 -0700
+
+ Fix SURROGATE_VALUE() to match what RFC 2781 says.
+
+ While we're at it, note in the comment for get_utf_16_string() the
+ "decoding UTF-16" algorithm in RFC 2781.
+
+ Change-Id: I5d7dc5c09af0474c055796e49e0c7b94fa87d2ad
+ Reviewed-on: https://code.wireshark.org/review/22171
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 435c68cd2b856a6be7d015e8703c6c83d9b8eb89)
+ Reviewed-on: https://code.wireshark.org/review/22174
+
+commit e7a9ae7
+Author: Michael Mann <mmann78@netscape.net>
+Date: Wed Jun 14 12:52:09 2017 -0400
+
+ packet-btrfcomm.c: Prevent over bit shift in get_le_multi_byte_value.
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2163
+ Bug: 13783
+ Change-Id: I92cefec86f9545345d00cf28e32ef7c05064417c
+ Reviewed-on: https://code.wireshark.org/review/22141
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 552dab08a6ea1b47465d888c613c353f8697e918)
+ Reviewed-on: https://code.wireshark.org/review/22154
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 3c7168c
+Author: Michael Mann <mmann78@netscape.net>
+Date: Tue Jun 13 23:05:24 2017 -0400
+
+ WBXML: Fix some more potential infinite loops.
+
+ tvb_get_guintvar can generate some unrealistic values so do some
+ sanity checking on them.
+
+ Bug: 13796
+ Change-Id: I2d5f7a48c2e982a419ea6ab3ac0000be3b6bcbc7
+ Reviewed-on: https://code.wireshark.org/review/22121
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 50fa2d95833ec2e2b0de3000eda7b290fc23eaeb)
+ Reviewed-on: https://code.wireshark.org/review/22130
+
+commit 283b0af
+Author: Michael Mann <mmann78@netscape.net>
+Date: Tue Jun 13 20:37:11 2017 -0400
+
+ DOCSIS: Prevent infinite loop from unknown FCParm.
+
+ concatlen was not updated if FCParm was unknown, leading to an infinite loop.
+
+ # Conflicts:
+ # plugins/docsis/packet-docsis.c
+
+ Bug: 13797
+ Change-Id: I1b64d757a369183a711f01b0b5cd1ba7aa0787bc
+ Reviewed-on: https://code.wireshark.org/review/22120
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 26a6881014c85c935f2794f6eeb852849137c20a)
+ Reviewed-on: https://code.wireshark.org/review/22124
+ Reviewed-on: https://code.wireshark.org/review/22126
+
+commit d414f5c
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 11 08:36:06 2017 +0000
+
+ [Automatic update for 2017-06-11]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: I2ca6804b96a3b9d464b9f951b014ac3caf2f5648
+ Reviewed-on: https://code.wireshark.org/review/22070
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit e7cb1d8
+Author: Martin Kaiser <wireshark@kaiser.cx>
+Date: Wed Jun 7 23:26:33 2017 +0200
+
+ wsmp: read the message length as big endian
+
+ We add the message length to the tree as big endian but we interpret it
+ as little endian for our further calculations. This causes parsing
+ errors. Use big endian for both cases.
+
+ Bug: 13766
+ Change-Id: I4e6cdb7d4267be96ea78eb664e88c532a9a90b52
+ Reviewed-on: https://code.wireshark.org/review/22024
+ Petri-Dish: Martin Kaiser <wireshark@kaiser.cx>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit bd130766438546ab64f7540597a2e3b82cbf8a3c)
+ Reviewed-on: https://code.wireshark.org/review/22030
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 565b67c
+Author: Anders Broman <a.broman58@gmail.com>
+Date: Tue May 23 10:56:03 2017 +0000
+
+ Revert "Fix issue with dissecting multiple DT1 packets in the frame"
+
+ Bug: 13651
+ This reverts commit daefa86695ecb6f859615ccd1bee6269e2c568a5.
+
+ Change-Id: I50eee7ae99bc471d95365a8da0271188d826ac46
+ Reviewed-on: https://code.wireshark.org/review/21738
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 8fd14b796055fc45f0aac0ee6d24bfb183bebe43)
+ Reviewed-on: https://code.wireshark.org/review/22016
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+
+commit 74ad6ed
+Author: Ivan Nardi <nardi.ivan@gmail.com>
+Date: Mon Jun 5 13:24:03 2017 +0200
+
+ [Bssmap] Fix and improve dissection
+
+ See TS 48.008:
+ * in "Perform Location Request" msg, "Cell Identifier" ie is optional, not mandatory (3.2.1.71)
+ * in "Uplink Releae Command" msg, "Cause" ie is mandatory (3.2.1.62)
+ * fixed and improved "Service Handover" ie dissection (3.2.2.75)
+
+ Change-Id: I2194bf56ef21a2cccbd4f2ed7ff22565af04cddd
+ Reviewed-on: https://code.wireshark.org/review/21957
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 795077b3ea95b1c2fb8f8cf5c6971da05a0c3ed2)
+ Reviewed-on: https://code.wireshark.org/review/21962
+
+commit ad0663e
+Author: Ivan Nardi <nardi.ivan@gmail.com>
+Date: Sun Jun 4 12:46:50 2017 +0200
+
+ [SGsAP] Fix Release-Request msg
+
+ "SGs Cause" is an optional ie, not a mandatory one. See TS 29.118 8.23.1
+
+ Change-Id: I74ad90d159e667fa41f8c099520ce5f662a4d85e
+ Reviewed-on: https://code.wireshark.org/review/21939
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 88cf898c4409d4267ef11eb6676cca5c8b05c435)
+ Reviewed-on: https://code.wireshark.org/review/21945
+
+commit a32ee6a
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jun 4 08:29:27 2017 +0000
+
+ [Automatic update for 2017-06-04]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: Ib270518cf13dd3184169bed02270415f658d4e9a
+ Reviewed-on: https://code.wireshark.org/review/21935
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit af9cf12
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Mon May 29 21:49:26 2017 +0200
+
+ TCAP: fix SRT analysis
+
+ When reviewing the code, the following issues were identified:
+ - otid/dtid on 3 bytes were not stored
+ - when receiving the first continue from dest, the TC_END hash entry was
+ created with the source tid / address instead of destination ones
+ - when receiving the first continue from src, the logic could prevent
+ the creation of the hash entry
+
+ Bug: 13739
+ Change-Id: If4ee70f0fa69f5ff74fdf75f3a741102baa0121a
+ Reviewed-on: https://code.wireshark.org/review/21780
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit f434820705b7875e5eaab1bba77c0264b1eb1bd6)
+ Conflicts:
+ epan/dissectors/asn1/tcap/packet-tcap-template.c
+ epan/dissectors/asn1/tcap/tcap.cnf
+ epan/dissectors/packet-tcap.c
+ Reviewed-on: https://code.wireshark.org/review/21898
+
+commit fbb83f5
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Thu Jun 1 13:51:51 2017 -0700
+
+ 2.0.13 → 2.0.14.
+
+ Change-Id: I52ca7078683e4927f5575e189ee840105c0c8c07
+ Reviewed-on: https://code.wireshark.org/review/21885
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
diff --git a/NEWS b/NEWS
index 1a09190b0d..f744900232 100644
--- a/NEWS
+++ b/NEWS
@@ -12,10 +12,40 @@ What's New
Bug Fixes
The following vulnerabilities have been fixed:
- * [1]wnpa-sec-2017-34
- A dissector went awry. (ws-buglink:XXXX[])
+ * [1]wnpa-sec-2017-13
+ WBMXL dissector infinite loop ([2]Bug 13477, [3]Bug 13796)
+ [4]CVE-2017-7702, cve-idlink:CVE-2017-11410[] Note: This is an
+ update for a fix in Wireshark 2.2.6 and 2.0.12.
+
+ * [5]wnpa-sec-2017-28
+ openSAFETY dissector memory exhaustion ([6]Bug 13649, [7]Bug 13755)
+ [8]CVE-2017-9350, [9]CVE-2017-11411 Note: This is an update for a
+ fix in Wireshark 2.2.7.
+
+ * [10]wnpa-sec-2017-34
+ AMQP dissector crash. ([11]Bug 13780) [12]CVE-2017-11408
+ * [13]wnpa-sec-2017-35
+ MQ dissector crash. ([14]Bug 13792) [15]CVE-2017-11407
+ * [16]wnpa-sec-2017-36
+ DOCSIS infinite loop. ([17]Bug 13797) [18]CVE-2017-11406
+ * [19]wnpa-sec-2017-37
+ GPRS LLC large loop. ([20]Bug 13603) [21]CVE-2017-11409
The following bugs have been fixed:
+ * Regression in SCCP fragments handling. ([22]Bug 13651)
+ * TCAP SRT incorrectly matches TC_BEGINs and TC_ENDs. ([23]Bug 13739)
+ * Dissector for WSMP (IEEE 1609.3) not current. ([24]Bug 13766)
+ * DAAP dissector dissect_daap_one_tag recursion stack exhausted.
+ ([25]Bug 13799)
+ * Malformed DCERPC PNIO packet decode, exception handler invalid
+ pointer reference. ([26]Bug 13811)
+ * It seems SPVID was decoded from wrong field. ([27]Bug 13821)
+ * README.dissectors: Add notes about predefined string structures not
+ available to plugin authors. ([28]Bug 13828)
+ * cmake/modules/FindZLIB.cmake doesn't find inflatePrime. ([29]Bug
+ 13850)
+ * [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type
+ int in packet-btrfcomm.c:314:37. ([30]Bug 13783)
New and Updated Features
@@ -31,9 +61,13 @@ What's New
Updated Protocol Support
+ AMQP, BSSMAP, BT RFCOMM, DAAP, DOCSIS, GPRS LLC, ISIS LSP, MQ,
+ OpenSafety, OSPF, PROFINET IO, SCCP, TCAP, TCP, UMTS FP, UMTS RLC,
+ WBMXL, and WSMP
+
New and Updated Capture File Support
- There is no new or updated capture file support in this release.
+ pcap
New and Updated Capture Interfaces support
@@ -44,14 +78,14 @@ What's New
Getting Wireshark
Wireshark source code and installation packages are available from
- [2]https://www.wireshark.org/download.html.
+ [31]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
- found on the [3]download page on the Wireshark web site.
+ found on the [32]download page on the Wireshark web site.
__________________________________________________________________
File Locations
@@ -64,59 +98,88 @@ File Locations
Known Problems
- Dumpcap might not quit if Wireshark or TShark crashes. ([4]Bug 1419)
+ Dumpcap might not quit if Wireshark or TShark crashes. ([33]Bug 1419)
- The BER dissector might infinitely loop. ([5]Bug 1516)
+ The BER dissector might infinitely loop. ([34]Bug 1516)
- Capture filters aren't applied when capturing from named pipes. ([6]Bug
- 1814)
+ Capture filters aren't applied when capturing from named pipes.
+ ([35]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
- ([7]Bug 2234)
+ ([36]Bug 2234)
- Application crash when changing real-time option. ([8]Bug 4035)
+ Application crash when changing real-time option. ([37]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
- ([9]Bug 4985)
+ ([38]Bug 4985)
- Wireshark should let you work with multiple capture files. ([10]Bug
+ Wireshark should let you work with multiple capture files. ([39]Bug
10488)
Dell Backup and Recovery (DBAR) makes many Windows applications crash,
- including Wireshark. ([11]Bug 12036)
+ including Wireshark. ([40]Bug 12036)
__________________________________________________________________
Getting Help
- Community support is available on [12]Wireshark's Q&A site and on the
+ Community support is available on [41]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [13]the web site.
+ all of Wireshark's mailing lists can be found on [42]the web site.
Official Wireshark training and certification are available from
- [14]Wireshark University.
+ [43]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [15]Wireshark web site.
+ A complete FAQ is available on the [44]Wireshark web site.
__________________________________________________________________
- Last updated 2017-06-01 20:50:19 UTC
+ Last updated 2017-07-18 15:17:14 UTC
References
- 1. https://www.wireshark.org/security/wnpa-sec-2017-34.html
- 2. https://www.wireshark.org/download.html
- 3. https://www.wireshark.org/download.html#thirdparty
- 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
- 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
- 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
- 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
- 12. https://ask.wireshark.org/
- 13. https://www.wireshark.org/lists/
- 14. http://www.wiresharktraining.com/
- 15. https://www.wireshark.org/faq.html
+ 1. https://www.wireshark.org/security/wnpa-sec-2017-13.html
+ 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
+ 3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13796
+ 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7702
+ 5. https://www.wireshark.org/security/wnpa-sec-2017-28.html
+ 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
+ 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13755
+ 8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350
+ 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11411
+ 10. https://www.wireshark.org/security/wnpa-sec-2017-34.html
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13780
+ 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11408
+ 13. https://www.wireshark.org/security/wnpa-sec-2017-35.html
+ 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13792
+ 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11407
+ 16. https://www.wireshark.org/security/wnpa-sec-2017-36.html
+ 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13797
+ 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11406
+ 19. https://www.wireshark.org/security/wnpa-sec-2017-37.html
+ 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13603
+ 21. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11409
+ 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13651
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13739
+ 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13766
+ 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13799
+ 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13811
+ 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13821
+ 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13828
+ 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13850
+ 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13783
+ 31. https://www.wireshark.org/download.html
+ 32. https://www.wireshark.org/download.html#thirdparty
+ 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
+ 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
+ 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
+ 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
+ 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036
+ 41. https://ask.wireshark.org/
+ 42. https://www.wireshark.org/lists/
+ 43. http://www.wiresharktraining.com/
+ 44. https://www.wireshark.org/faq.html
diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc
index 9b2da06839..da9ac81c36 100644
--- a/docbook/release-notes.asciidoc
+++ b/docbook/release-notes.asciidoc
@@ -16,7 +16,7 @@ The following vulnerabilities have been fixed:
+
WBMXL dissector infinite loop
(ws-buglink:13477[], ws-buglink:13796[])
-//cve-idlink:2017-7702[]
+cve-idlink:2017-7702[], cve-idlink:CVE-2017-11410[]
// Fixed in master: 8e1befc, 50fa2d9
// Fixed in master-2.2: bb67dbf, 651a974
// Fixed in master-2.0: 2f322f6, 3c7168c
@@ -29,7 +29,7 @@ Note: This is an update for a fix in Wireshark 2.2.6 and 2.0.12.
+
openSAFETY dissector memory exhaustion
(ws-buglink:13649[], ws-buglink:13755[])
-// cve-idlink:2017-9350[]
+cve-idlink:2017-9350[], cve-idlink:2017-11411[]
// Fixed in master: f643169, 66c5058
// Fixed in master-2.2: 3ce1ba9, 54acd9b
// Fixed in master-2.0: dbc7cb0, a83a324
@@ -42,7 +42,7 @@ Note: This is an update for a fix in Wireshark 2.2.7.
+
AMQP dissector crash.
(ws-buglink:13780[])
-// cve-idlink:2017-XXXX[]
+cve-idlink:2017-11408[]
// Fixed in master: 246cbbc, 2de483c
// Fixed in master-2.2: d6231d9, a102c17
// Fixed in master-2.0: e57c86e
@@ -51,7 +51,7 @@ AMQP dissector crash.
+
MQ dissector crash.
(ws-buglink:13792[])
-// cve-idlink:2017-XXXX[]
+cve-idlink:2017-11407[]
// Fixed in master: bb58b3a
// Fixed in master-2.2: 4e54dae
// Fixed in master-2.0: 8fcd725
@@ -60,7 +60,7 @@ MQ dissector crash.
+
DOCSIS infinite loop.
(ws-buglink:13797[])
-// cve-idlink:2017-XXXX[]
+cve-idlink:2017-11406[]
// Fixed in master: 26a6881
// Fixed in master-2.2: 2502162
// Fixed in master-2.0: 283b0af
@@ -69,7 +69,7 @@ DOCSIS infinite loop.
+
GPRS LLC large loop.
(ws-buglink:13603[])
-// cve-idlink:2017-XXXX[]
+cve-idlink:2017-11409[]
// Fixed in master: n/a
// Fixed in master-2.2: n/a
// Fixed in master-2.0: 57b83bb
diff --git a/version.conf b/version.conf
index 6dedd7c96a..9480b2f829 100644
--- a/version.conf
+++ b/version.conf
@@ -1,9 +1,9 @@
# Interim releases: Enable packaging, add a "rc" to the version.
-enable: 1
-pkg_format: rc0-%#
-pkg_enable: 1
+#enable: 1
+#pkg_format: rc0-%#
+#pkg_enable: 1
# Final release: Disable package version stamps.
-#enable: 1
-#pkg_format:
-#pkg_enable: 0
+enable: 1
+pkg_format:
+pkg_enable: 0