diff options
| -rw-r--r-- | ChangeLog | 662 | ||||
| -rw-r--r-- | NEWS | 174 | ||||
| -rw-r--r-- | version.conf | 12 |
3 files changed, 750 insertions, 98 deletions
@@ -0,0 +1,662 @@ +commit 846db80ce5 +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Jan 8 09:50:49 2019 -0800 + + Update the release notes for 2.4.12. + + Change-Id: I41d1fae661adaa62727f788d0fa3fbf311e26633 + Reviewed-on: https://code.wireshark.org/review/31451 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit cd09cb5cfb +Author: Gerald Combs <gerald@wireshark.org> +Date: Mon Jan 7 14:41:29 2019 -0800 + + epan: Add a boundary check to get_t61_string. + + Add a boundary check to make sure we don't go past the end of "ptr". + + Bug: 15373 + Change-Id: I85394e8e6e477b47919362af146051cc8911254b + Reviewed-on: https://code.wireshark.org/review/31440 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 464786092c +Author: Gerald Combs <gerald@wireshark.org> +Date: Sun Jan 6 08:44:04 2019 +0000 + + [Automatic update for 2019-01-06] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I9566efd494e694d7fc9f45ca1353bd65a9f2677d + Reviewed-on: https://code.wireshark.org/review/31404 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit a8304056ca +Author: Dario Lombardo <lomato@gmail.com> +Date: Sat Jan 5 23:22:50 2019 +0100 + + doc: remove wrong trailing slash. + + Change-Id: If6bcf2ce9754453cfff434dde67b682761b37231 + Reviewed-on: https://code.wireshark.org/review/31394 + Petri-Dish: Dario Lombardo <lomato@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit ec606cc59e943d27a71b07e5ee832acdf789c811) + Reviewed-on: https://code.wireshark.org/review/31396 + +commit f85c9f0a1d +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat Jan 5 13:35:08 2019 -0800 + + Remove comment whose meaning is unclear at best. + + What is is it saying we shouldn't be doing? + + Change-Id: Iad26687f3f3f482af09760255fef7189ed71a3ae + Reviewed-on: https://code.wireshark.org/review/31391 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (backported from commit 10a7993bae60a66f64595de28ad0c764484a641a) + Reviewed-on: https://code.wireshark.org/review/31393 + +commit 0ce320b733 +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu Jan 3 12:21:19 2019 -0800 + + Avoid definition collisions for INVALID_SOCKET. + + Newer versions of libpcap define it (due to the somewhat infelicitous + API for "active mode" remote capture, which returns a socket); don't + define it ourselves if it's already defined. + + Change-Id: I620576620fd2708ebd503da696e17b472bc20472 + Reviewed-on: https://code.wireshark.org/review/31344 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 20ad0ffbaf1d49bf3da50a62c0bed93f765b9e31) + Reviewed-on: https://code.wireshark.org/review/31346 + +commit 5f7ba271ec +Author: Peter Wu <peter@lekensteyn.nl> +Date: Mon Dec 31 14:07:32 2018 +0100 + + wsutil: fix crash due to corruption of the "small_buffers" array + + Gracefully handle repeated calls of ws_buffer_free on the same buffer to + avoid strange crashes in other new users that allocate a "small" buffer. + + The first call to ws_buffer_free would store data pointer in the + 'small_buffers' array for reuse and set the pointer to NULL. Result: + + (gdb) p cfile.rec.options_buf + $2 = { + data = 0x0, + allocated = 2048, // Oops, not modified! + start = 0, + first_free = 0 + } + + All users of Buffer (including ws_buffer_free) however asssume that + 'allocated' reflects the actual size of 'data'. If this is not the case + (if ws_buffer_free is called again), then a data pointer (NULL!) will be + stored and the next ws_buffer_init request for a "small buffer" will + result in unexpected behavior (including crashes). + + Fix the issue by clearing the 'allocated' field as well. Add assertions + to catch such issues earlier rather than crashing at random users of + these buffers (such as frame_tvbuff). + + Bug: 15263 + Change-Id: I0b491c3fccac8c6fddd43779629343d721638ca9 + Reviewed-on: https://code.wireshark.org/review/31278 + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit ae2a75233cec4e1286964963e6ac4ba936322cb1) + Reviewed-on: https://code.wireshark.org/review/31302 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + +commit cf1075662f +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Tue Jan 1 12:57:07 2019 +0100 + + Happy New Year 2019! + + Change-Id: Ic140aafdb32e649e88bf3f00bda3cec9404e555a + Reviewed-on: https://code.wireshark.org/review/31284 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + (cherry picked from commit a05ba5be694635211486a2e1f131b5ae2ffadc51) + Reviewed-on: https://code.wireshark.org/review/31285 + (cherry picked from commit c4e134bc537dedbb16293c37f367a7082028fe37) + Reviewed-on: https://code.wireshark.org/review/31286 + +commit b7775ad502 +Author: Peter Wu <peter@lekensteyn.nl> +Date: Wed Dec 19 15:52:23 2018 +0100 + + Revert "Add routines to load Lua programs that assume the path is UTF-8 on Windows." + + This reverts commit 5953756305388724545f0df46d286be2f02c048a. + + The public API should not be polluted with Windows-specific hacks. As we + already override dofile/loadfile, those should be fixed instead. + + Ping-Bug: 15118 + Change-Id: Ia9d5e64e8ef14032f982f695ffd4cac59067bb17 + Reviewed-on: https://code.wireshark.org/review/31134 + Reviewed-by: Peter Wu <peter@lekensteyn.nl> + Petri-Dish: Peter Wu <peter@lekensteyn.nl> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 07cfef9e5a9424c22281df1a7dda4e283c0b7ddc) + Reviewed-on: https://code.wireshark.org/review/31263 + +commit 44f7182057 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Dec 30 08:43:38 2018 +0000 + + [Automatic update for 2018-12-30] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I4f88d120aa3d104b3dcbf60f511f7cb56df9191d + Reviewed-on: https://code.wireshark.org/review/31256 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 356e238f8c +Author: Guy Harris <guy@alum.mit.edu> +Date: Fri Dec 28 19:26:03 2018 -0800 + + Small cleanups. + + Get rid of an extra blank line in a comment. + + Change another comment to refer to "error packets", as we do elsewhere. + + Fix indentation. + + Change-Id: I4d81b8856ea876f20914352f962b1df0e115404c + Reviewed-on: https://code.wireshark.org/review/31241 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit d68a8a36054a26e520647a9402e9e405efd8cf3e) + Reviewed-on: https://code.wireshark.org/review/31250 + +commit e2e4e28abc +Author: Guy Harris <guy@alum.mit.edu> +Date: Sat Dec 29 11:25:19 2018 -0800 + + Fix indentation. + + Change-Id: I6cc3373d043e6a8203a5f70eb03f03bb6cd8a6d9 + Reviewed-on: https://code.wireshark.org/review/31246 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 1fe5921b7bd942022d2a2f5c0a27bb0d479ae6bd) + Reviewed-on: https://code.wireshark.org/review/31248 + +commit 6343cbf5e2 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Fri Dec 28 10:38:44 2018 +0100 + + GTPv2: fix dissection of APN IE + + The total maximum length of the APN with Network Identifier and Operator + Identifier is 100 bytes. + + Bug: 15383 + Change-Id: Ib74eac1f18f2235c2788e58370f50eeb9a678357 + Reviewed-on: https://code.wireshark.org/review/31225 + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 6180d0fdaa5e27de9fcddba7bd9d47adc0c71a42) + Reviewed-on: https://code.wireshark.org/review/31229 + +commit b5b02f2a9b +Author: Jaap Keuter <jaap.keuter@xs4all.nl> +Date: Mon Dec 24 23:15:26 2018 +0100 + + ISAKMP: Fix a crash when no decryption data block is there + + Don't try to (re)set parameters in a struct when its pointer + points to NULL. + + Bug: 15374 + Change-Id: I953e82795990fde5fce2ad6d955781b372a9e405 + Signed-off-by: Jaap Keuter <jaap.keuter@xs4all.nl> + Reviewed-on: https://code.wireshark.org/review/31189 + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit c9cfae7fecd4bc21b8b4f48328d08e104d47dd52) + Reviewed-on: https://code.wireshark.org/review/31220 + Petri-Dish: Michael Mann <mmann78@netscape.net> + +commit e06172dfe0 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Dec 23 08:41:13 2018 +0000 + + [Automatic update for 2018-12-23] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Ie03ab83d8fd439523288496e4ea3db3f9b1062f1 + Reviewed-on: https://code.wireshark.org/review/31177 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit de09a49c7c +Author: Anders Broman <anders.broman@ericsson.com> +Date: Thu Dec 20 11:04:54 2018 +0100 + + ANSI MAP: borderCellAccess parameter coded as tag 50 but should be 58. + + Bug: 15372 + Change-Id: I11886649dbd390655505d93e4378fe38dff8fb64 + Reviewed-on: https://code.wireshark.org/review/31144 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 31e38c312b4157c0d93c80db0ae3b712271d3c17) + Reviewed-on: https://code.wireshark.org/review/31146 + +commit 516be16a35 +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed Dec 19 09:20:02 2018 -0800 + + Qt: Open our preference dialogs via "clicked" signals. + + In ModulePreferencesScrollArea we create QPushButtons that open modal + UAT and file dialogs. Open them via the "clicked" signal instead of + the "pressed" signal. "clicked" is a general activation signal that + fires after the mouse button has been clicked+released or a keyboard + event. "pressed" fires before "released" and can be problematic in + some cases. + + Bug: 15366 + Change-Id: Icb353d86ae0a4b4b97e5f63df791ec562070756d + Reviewed-on: https://code.wireshark.org/review/31125 + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit a2970e017c +Author: Gerald Combs <gerald@wireshark.org> +Date: Tue Dec 18 08:30:27 2018 -0800 + + Lua: Fix compilation with Lua 5.1. + + Change-Id: Idd4aa36ee95e985560867094d423128e51aacfb1 + Reviewed-on: https://code.wireshark.org/review/31095 + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Gerald Combs <gerald@wireshark.org> + (cherry picked from commit 060811713fa63e04cbed95af4e7720794a1bf3a6) + Reviewed-on: https://code.wireshark.org/review/31118 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit a7ec649385 +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed Dec 5 09:59:23 2018 -0800 + + Fix some spelling errors found by Lintian. + + Change-Id: If6fc3aab7ad4fc634567121f7b9541bc6f6c5766 + Reviewed-on: https://code.wireshark.org/review/30926 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + Petri-Dish: Gerald Combs <gerald@wireshark.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (backported from commit 8c22c5badecf16c2a7881db28254ba22c7cb3d1c) + Reviewed-on: https://code.wireshark.org/review/31114 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit dcab121f39 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 18 23:13:02 2018 -0800 + + Don't free something before freeing some of its contents. + + Free the wspstat_t only after freeing the hash table contained in it. + + Change-Id: I2aa31d74b6d0f86e5404a9b614fee8a3f6708938 + Ping-Bug: 15365 + Reviewed-on: https://code.wireshark.org/review/31108 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 0fc7f3781351c23cf05bdaafc1dd3dc6f9a08a2c) + Reviewed-on: https://code.wireshark.org/review/31110 + +commit b3f7c408e3 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 18 22:58:24 2018 -0800 + + Clean up exp_pdu_open() API. + + It really shouldn't free the comment passed to it, as the caller + allocated it, and knows how to free it if necessary; it might not even + have been allocated. + + Make the comment argument a "const char *" to 1) allow passing string + constants etc. and 2) to catch any attempts to free it in + exp_pdu_open(). + + Make the callers free it after exp_pdu_open() returns. + + (Alternatively, we could have exp_pdu_open() take the file name argument + and generate the comment itself, so that all code paths generate the + same comment.) + + Change-Id: I6e6924b05565761b641a6c3b4d9a2e97f4264e1b + Ping-Bug: 15365 + Reviewed-on: https://code.wireshark.org/review/31105 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 05b43fc5af805dde1bdbf74dd1448690f3a10705) + Reviewed-on: https://code.wireshark.org/review/31107 + +commit 9035f52ca2 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 18 22:03:35 2018 -0800 + + Always set *dfp to NULL on an error return from dfilter_compile(). + + All other error-return code paths set *dfp to NULL; make this one do so + as well. + + Change-Id: I4015c1d53bdbac99cdeda158d7d01c8da7bf2562 + Reviewed-on: https://code.wireshark.org/review/31102 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 9d8b0a9cd0afca4c9bfebefd7154185c5c93afdb) + Reviewed-on: https://code.wireshark.org/review/31104 + +commit 7c3eae7737 +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 18 14:03:07 2018 -0800 + + Don't assume the filter will be non-null. + + There's no guarantee that sp->filter is non-null; if it's null, that + means there's no filter. + + Bug: 15369 + Change-Id: I2a61db2e134aa70d30c2265b63aabf99c35e362e + Reviewed-on: https://code.wireshark.org/review/31096 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 053f47fdefc9bcb36983129b77b7e1754d4304bb) + Reviewed-on: https://code.wireshark.org/review/31098 + +commit 259b5dea2b +Author: Guy Harris <guy@alum.mit.edu> +Date: Tue Dec 18 00:49:21 2018 -0800 + + Treat the strings for simple dialogs as UTF-8 on Windows. + + On Windows, filename strings inside Wireshark are UTF-8 strings, so + error messages containing file names are UTF-8 strings. Convert from + UTF-8, not from the local code page. + + Bug: 15367 + Change-Id: I52f3de2606ec6a592e7cb82b1a9aaeeef8acecef + Reviewed-on: https://code.wireshark.org/review/31090 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit ae83101dd5643c3852ca67ffb331cd8dbd20c727) + Reviewed-on: https://code.wireshark.org/review/31092 + +commit 4594f47e3b +Author: Guy Harris <guy@alum.mit.edu> +Date: Mon Dec 17 10:57:20 2018 -0800 + + Add routines to load Lua programs that assume the path is UTF-8 on Windows. + + Add ws_dofile() and ws_loadfile(), which are like the substitute + dofile() and loadfile() we provide, but that, on Windows, take a UTF-8 + path rather than a path in the local code page. + + Use that to load console.lua. + + This means we can load console.lua on Windows even if the full path to + it includes non-ASCII characters. + + Bug: 15118 + Change-Id: Iaa00639563fe53a34e1e24e42022f3886a38e7c5 + Reviewed-on: https://code.wireshark.org/review/31075 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 5953756305388724545f0df46d286be2f02c048a) + Reviewed-on: https://code.wireshark.org/review/31078 + +commit f4fd3c95a7 +Author: Pascal Quantin <pascal.quantin@gmail.com> +Date: Wed Dec 12 21:35:52 2018 +0100 + + GSM A: detect buffer overrun when decoding MS Classmark 3 IE + + Change-Id: I12d372afd8a50b9a04f92c53077e79116db6c255 + Reviewed-on: https://code.wireshark.org/review/31024 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + (cherry picked from commit 144d481c2035a8d3d6d0b915a26a076a7ddcc371) + Reviewed-on: https://code.wireshark.org/review/31071 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit f7c17a34d3 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Dec 16 08:41:16 2018 +0000 + + [Automatic update for 2018-12-16] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: I57a010c16a8a407563487e539a9f24882dd50d6e + Reviewed-on: https://code.wireshark.org/review/31062 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 527aaf060b +Author: Anders Broman <anders.broman@ericsson.com> +Date: Tue Dec 11 09:59:38 2018 +0100 + + ASNI MAP: AnalogRedirectRecord is OPTIONAL in QualificationRequest + + Bug: 15350 + Change-Id: Ibe7f085daa2981168b3c5201256d674feb4cb7e5 + Reviewed-on: https://code.wireshark.org/review/31004 + Petri-Dish: Anders Broman <a.broman58@gmail.com> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 9035a131e5ba9e8b653a0e3a95b79569905a50f8) + Reviewed-on: https://code.wireshark.org/review/31005 + +commit bf9272a92f +Author: Stig Bjørlykke <stig@bjorlykke.org> +Date: Sun Dec 9 21:54:18 2018 +0100 + + p_mul: Detect Data PDU sequence number 0 + + Data PDU sequence number 0 is illegal, add an expert info for this. + Don't include this packet in SEQ/ACK analysis. + + Bug: 15337 + Change-Id: I476088531e8a3605393ee1dedf1e8b159dac342b + Reviewed-on: https://code.wireshark.org/review/30980 + Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 3cccd4ec5b922e79afd134db4f0c9acb10bf7202) + Reviewed-on: https://code.wireshark.org/review/30987 + Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org> + +commit c1a9eefc33 +Author: Michael Mann <mmann78@netscape.net> +Date: Sun Dec 9 09:27:31 2018 -0500 + + Multicast Statistics Dialog: Clear list when redrawing + + The multicast statistics tap provides a continually updating list which the draw function just has to iterate through. + + Bug: 15271 + Change-Id: I270e7ca9460ec9568756b6c8d98f4f17653c8cad + Reviewed-on: https://code.wireshark.org/review/30976 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit 96c52c1a0f7585fc0130ce26f66c340589965ff9) + Reviewed-on: https://code.wireshark.org/review/30982 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit ab4ff21bdd +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Dec 9 08:39:32 2018 +0000 + + [Automatic update for 2018-12-09] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Ia11b927bdbb84e4ee4d6db55015baa8fdbc8eb30 + Reviewed-on: https://code.wireshark.org/review/30975 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 102cf9d8f6 +Author: Guy Harris <guy@alum.mit.edu> +Date: Thu Dec 6 08:36:43 2018 -0800 + + Update comments, get rid of IMPORT_MAX_PACKET. + + Get rid of the IMPORT_MAX_PACKET #define; just directly use + WTAP_MAX_PACKET_SIZE_STANDARD, to match what text2pcap.c does. + + Update comments in text2pcap.c and ui/text_import.c to say the maximum + packet size is WTAP_MAX_PACKET_SIZE_STANDARD. + + Change-Id: I34118f76426d1416fccf43b2a356ad8d200de19b + Ping-Bug: 15292 + Reviewed-on: https://code.wireshark.org/review/30945 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (backported from commit 0946518780bc260d0668485b3f6f7e1d14325a7b) + Reviewed-on: https://code.wireshark.org/review/30947 + Petri-Dish: Guy Harris <guy@alum.mit.edu> + Tested-by: Petri Dish Buildbot + +commit fdb2dae5d8 +Author: Jaap Keuter <jaap.keuter@xs4all.nl> +Date: Thu Dec 6 13:49:04 2018 +0100 + + Qt: Fix tooltip on import size + + Import size is increased to 256kiB, but tooltip says 64kB. + Adjust text according to limit set bt code. + + Change-Id: I586248fd25a96e4ffe0936babc90b4150c14f118 + Ping-Bug: 15292 + Signed-off-by: Jaap Keuter <jaap.keuter@xs4all.nl> + Reviewed-on: https://code.wireshark.org/review/30940 + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit aadf8727178c9e0aa3ecc638d60bc1878d431f60) + Reviewed-on: https://code.wireshark.org/review/30944 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + +commit 1c66174ec7 +Author: Martin Kaiser <wireshark@kaiser.cx> +Date: Sat Mar 3 19:49:22 2018 +0100 + + enip: use wmem for copied addresses + + When we copy an address from pinfo into connInfo->O2T.ipaddress, a + shallow copy is not sufficient. connInfo->O2T.ipaddress is kept across + packets whereas pinfo is valid only for the current packet. + + Use wmem with file scope for the copied address. This fixes a + use-after-free error when we access the address in a subsequent packet. + + Bug: 14470 + Change-Id: I8b74037020189485485a506af6510cb45828e3c4 + Reviewed-on: https://code.wireshark.org/review/26248 + Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> + Petri-Dish: Martin Kaiser <wireshark@kaiser.cx> + Tested-by: Petri Dish Buildbot + Reviewed-by: Anders Broman <a.broman58@gmail.com> + (cherry picked from commit 177962a5b4a05759b40fb6fc07a4a6eec306a9bf) + Reviewed-on: https://code.wireshark.org/review/30941 + Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> + Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> + +commit f898da5451 +Author: Jaap Keuter <jaap.keuter@xs4all.nl> +Date: Wed Dec 5 16:08:06 2018 +0100 + + text2pcap: extend snap length + + The snaplength as saved in the capture file is set to the original + PCAP file length of 65535. In reality the package size can grow to + 256kiB. Make use of the correct constant when writing the PCAP file. + + Bug: 15292 + Change-Id: Ib7710e4151cdc712f3344c1436252f9b3bfb556c + Signed-off-by: Jaap Keuter <jaap.keuter@xs4all.nl> + Reviewed-on: https://code.wireshark.org/review/30923 + Tested-by: Petri Dish Buildbot + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit b63e2d7a950a30ac8791caa41b704b4b442ee451) + Reviewed-on: https://code.wireshark.org/review/30928 + (cherry picked from commit 7b019ff8028ea0b083bac090e9a80272677966d6) + Reviewed-on: https://code.wireshark.org/review/30929 + +commit ce9325daa9 +Author: Christophe GUERBER <christophe.guerber@gmail.com> +Date: Sun Dec 2 01:21:03 2018 +0100 + + Fixes IMF dissector + + When no content is provided, creating the tree with empty content leads + to malformed IMF. + + Ping-Bug: 15090 + Change-Id: Idf521c26f69638a94300792e50dba29645a45a68 + Reviewed-on: https://code.wireshark.org/review/30874 + Petri-Dish: Michael Mann <mmann78@netscape.net> + Tested-by: Petri Dish Buildbot + Reviewed-by: Michael Mann <mmann78@netscape.net> + (cherry picked from commit bf88197d94bf6045cf789a1aa332a8c88755556f) + Reviewed-on: https://code.wireshark.org/review/30888 + Reviewed-by: Anders Broman <a.broman58@gmail.com> + +commit b675563838 +Author: Guy Harris <guy@alum.mit.edu> +Date: Sun Dec 2 01:02:28 2018 -0800 + + Don't include <wsutil/wspcap.h> if we're not building with libpcap. + + We don't need it and, if there *is* no pcap.h header, because the pcap + headers aren't installed, it won't compile. + + Bug: 15317 + Change-Id: Ie2a107f6117aad8f87943cd72269211f13b71142 + Reviewed-on: https://code.wireshark.org/review/30883 + Reviewed-by: Guy Harris <guy@alum.mit.edu> + (cherry picked from commit 98d4b434fe4a7b162fa38eb31478ff086d32c040) + Reviewed-on: https://code.wireshark.org/review/30885 + +commit cbf3304058 +Author: Gerald Combs <gerald.combs@riverbed.com> +Date: Sun Dec 2 08:37:09 2018 +0000 + + [Automatic update for 2018-12-02] + + Update manuf, services enterprise numbers, translations, and other items. + + Change-Id: Id0e8ebd9e4992761be8941ebe377747c624ed83b + Reviewed-on: https://code.wireshark.org/review/30882 + Reviewed-by: Gerald Combs <gerald@wireshark.org> + +commit 0b30fc3dff +Author: Gerald Combs <gerald@wireshark.org> +Date: Wed Nov 28 12:46:05 2018 -0800 + + 2.4.11 → 2.4.12. + + Change-Id: I370af81902185295a911725394bfebefee3f5772 + Reviewed-on: https://code.wireshark.org/review/30828 + Reviewed-by: Gerald Combs <gerald@wireshark.org> @@ -1,4 +1,4 @@ - Wireshark 2.4.11 Release Notes + Wireshark 2.4.12 Release Notes __________________________________________________________________ What is Wireshark? @@ -12,39 +12,38 @@ What's New Bug Fixes The following vulnerabilities have been fixed: - * [1]wnpa-sec-2018-51 The Wireshark dissection engine could crash. - [2]Bug 14466. [3]CVE-2018-19625. - * [4]wnpa-sec-2018-52 The DCOM dissector could crash. [5]Bug 15130. - [6]CVE-2018-19626. - * [7]wnpa-sec-2018-53 The LBMPDM dissector could crash. [8]Bug 15132. - [9]CVE-2018-19623. - * [10]wnpa-sec-2018-54 The MMSE dissector could go into an infinite - loop. [11]Bug 15250. [12]CVE-2018-19622. - * [13]wnpa-sec-2018-55 The IxVeriWave file parser could crash. - [14]Bug 15279. [15]CVE-2018-19627. - * [16]wnpa-sec-2018-56 The PVFS dissector could crash. [17]Bug 15280. - [18]CVE-2018-19624. + * [1]wnpa-sec-2019-02 The P_MUL dissector could crash. [2]Bug 15337. + [3]CVE-2019-5717. + * [4]wnpa-sec-2019-03 The RTSE dissector and other dissectors could + crash. [5]Bug 15373. [6]CVE-2019-5718. + * [7]wnpa-sec-2019-04 The ISAKMP dissector could crash. [8]Bug 15374. + [9]CVE-2019-5719. + * [10]wnpa-sec-2019-05 The ISAKMP dissector could crash. [11]Bug + 14470. The following bugs have been fixed: - * VoIP Calls dialog doesn't include RTP stream when preparing a - filter. [19]Bug 13440. - * Wireshark installs on macOS with permissions for - /Library/Application Support/Wireshark that are too restrictive. - [20]Bug 14335. - * Closing Enabled Protocols dialog crashes wireshark. [21]Bug 14349. - * Encrypted Alerts corresponds to a wrong selection in the packet - bytes pane. [22]Bug 14712. - * MATE unable to extract fields for PDU. [23]Bug 15208. - * Malformed Packet: SV. [24]Bug 15224. - * ISUP (ANSI) packets malformed in WS versions later than 2.4.8. - [25]Bug 15236. - * Handover candidate enquire message not decoded. [26]Bug 15237. - * MLE security suite display incorrect. [27]Bug 15288. - * Message for incorrect IPv4 option lengths is incorrect. [28]Bug - 15290. - * TACACS+ dissector does not properly reassemble large accounting - messages. [29]Bug 15293. - * NLRI of S-PMSI A-D BGP route not being displayed. [30]Bug 15307. + * console.lua not found in a folder with non-ASCII characters in its + name. [12]Bug 15118. + * Disabling Update list of packets in real time. will generally + trigger crash after three start capture, stop capture cycles. + [13]Bug 15263. + * UDP Multicast Stream double counts. [14]Bug 15271. + * text2pcap et al. set snaplength to 64kiB-1, while processing frames + of 256kiB. [15]Bug 15292. + * Builds without libpcap fail if the libpcap headers aren't + installed. [16]Bug 15317. + * TCAP AnalogRedirectRecord parameter incorrectly coded as mandatory + in QualReq_rr message. [17]Bug 15350. + * Wireshark jumps behind other windows when opening UAT dialogs. + [18]Bug 15366. + * Pathnames containing non-ASCII characters are mangled in error + dialogs on Windows. [19]Bug 15367. + * Executing -z http,stat -r file.pcapng throws a segmentation fault. + [20]Bug 15369. + * IS-41 TCAP RegistrationNotification Invoke has borderCellAccess + parameter coded as tag 50 (as denyAccess) but should be 58. [21]Bug + 15372. + * GTPv2 APN dissect problem. [22]Bug 15383. New and Updated Features @@ -56,12 +55,11 @@ What's New Updated Protocol Support - BGP, DCOM, GSM A BSSMAP, IEEE 802.11 Radiotap, ISUP, LBMPDM, LISP, MLE, - MMSE, PVFS, SLL, SSL/TLS, SV, and TACACS+ + ANSI MAP, ENIP, GSM A, GTPv2, IMF, ISAKMP, P_MUL, RTSE, and TCAP New and Updated Capture File Support - 3GPP TS 32.423 Trace, and IxVeriWave + There is no new or updated capture file support in this release. New and Updated Capture Interfaces support @@ -72,14 +70,14 @@ What's New Getting Wireshark Wireshark source code and installation packages are available from - [31]https://www.wireshark.org/download.html. + [23]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be - found on the [32]download page on the Wireshark web site. + found on the [24]download page on the Wireshark web site. __________________________________________________________________ File Locations @@ -92,84 +90,76 @@ File Locations Known Problems - Dumpcap might not quit if Wireshark or TShark crashes. ([33]Bug 1419) + Dumpcap might not quit if Wireshark or TShark crashes. ([25]Bug 1419) - The BER dissector might infinitely loop. ([34]Bug 1516) + The BER dissector might infinitely loop. ([26]Bug 1516) Capture filters aren't applied when capturing from named pipes. - ([35]Bug 1814) + ([27]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. - ([36]Bug 2234) + ([28]Bug 2234) - Application crash when changing real-time option. ([37]Bug 4035) + Application crash when changing real-time option. ([29]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. - ([38]Bug 4985) + ([30]Bug 4985) - Wireshark should let you work with multiple capture files. ([39]Bug + Wireshark should let you work with multiple capture files. ([31]Bug 10488) __________________________________________________________________ Getting Help - Community support is available on [40]Wireshark's Q&A site and on the + Community support is available on [32]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for - all of Wireshark's mailing lists can be found on [41]the web site. + all of Wireshark's mailing lists can be found on [33]the web site. Official Wireshark training and certification are available from - [42]Wireshark University. + [34]Wireshark University. __________________________________________________________________ Frequently Asked Questions - A complete FAQ is available on the [43]Wireshark web site. + A complete FAQ is available on the [35]Wireshark web site. __________________________________________________________________ - Last updated 2018-11-28 18:01:42 UTC + Last updated 2019-01-08 18:12:46 UTC References - 1. https://www.wireshark.org/security/wnpa-sec-2018-51.html - 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466 - 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19625 - 4. https://www.wireshark.org/security/wnpa-sec-2018-52.html - 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130 - 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19626 - 7. https://www.wireshark.org/security/wnpa-sec-2018-53.html - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132 - 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19623 - 10. https://www.wireshark.org/security/wnpa-sec-2018-54.html - 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250 - 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622 - 13. https://www.wireshark.org/security/wnpa-sec-2018-55.html - 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279 - 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19627 - 16. https://www.wireshark.org/security/wnpa-sec-2018-56.html - 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280 - 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19624 - 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13440 - 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14335 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14349 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14712 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15208 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15224 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15236 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15237 - 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15288 - 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15290 - 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15293 - 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15307 - 31. https://www.wireshark.org/download.html - 32. https://www.wireshark.org/download.html#thirdparty - 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 - 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 - 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 - 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 - 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 - 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 - 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 - 40. https://ask.wireshark.org/ - 41. https://www.wireshark.org/lists/ - 42. http://www.wiresharktraining.com/ - 43. https://www.wireshark.org/faq.html + 1. https://www.wireshark.org/security/wnpa-sec-2019-02.html + 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337 + 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5717 + 4. https://www.wireshark.org/security/wnpa-sec-2019-03.html + 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373 + 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5718 + 7. https://www.wireshark.org/security/wnpa-sec-2019-04.html + 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374 + 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5719 + 10. https://www.wireshark.org/security/wnpa-sec-2019-05.html + 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14470 + 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15118 + 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15263 + 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15271 + 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15292 + 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15317 + 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15350 + 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15366 + 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15367 + 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15369 + 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15372 + 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15383 + 23. https://www.wireshark.org/download.html + 24. https://www.wireshark.org/download.html#thirdparty + 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 + 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 + 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 + 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 + 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 + 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 + 32. https://ask.wireshark.org/ + 33. https://www.wireshark.org/lists/ + 34. http://www.wiresharktraining.com/ + 35. https://www.wireshark.org/faq.html diff --git a/version.conf b/version.conf index b999997703..cc8d9d1108 100644 --- a/version.conf +++ b/version.conf @@ -1,9 +1,9 @@ # Interim releases: Enable packaging, add an "rc" to the version. -enable: 1 -pkg_format: rc0-%# -pkg_enable: 1 +#enable: 1 +#pkg_format: rc0-%# +#pkg_enable: 1 # Final release: Disable package version stamps. -#enable: 1 -#pkg_format: -#pkg_enable: 0 +enable: 1 +pkg_format: +pkg_enable: 0 |
