aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--ChangeLog872
-rw-r--r--NEWS157
-rw-r--r--docbook/release-notes.asciidoc12
-rw-r--r--version.conf12
4 files changed, 963 insertions, 90 deletions
diff --git a/ChangeLog b/ChangeLog
index e69de29bb2..df6a03f7b9 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -0,0 +1,872 @@
+commit f975a8cd79
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Feb 27 09:40:21 2019 -0800
+
+ Build 2.4.13.
+
+ Change-Id: I118101fe3b3ca793277a3e34f7661bfb069f6b0a
+
+commit c557bb0910
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Wed Feb 27 15:02:01 2019 +0100
+
+ rpcap: check conversation existence before dereferencing it.
+
+ Conflicts:
+ epan/dissectors/packet-rpcap.c
+
+ Bug: 15536
+ Change-Id: I370b7f4b3f647243490cbfadc120f0198c62b09b
+ Reviewed-on: https://code.wireshark.org/review/32232
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 2f048c932d0c063bd53651d0fd8f31a66eede741)
+ Reviewed-on: https://code.wireshark.org/review/32236
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 342c628081
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue Feb 26 15:20:57 2019 -0800
+
+ MS Proxy: Initialize a variable.
+
+ Zero-initialize a variable. This should fix bug 15534, although I can't
+ reproduce it here.
+
+ Bug: 15534
+ Change-Id: I7ee685e99e225d054386ead998cb4de681a2e759
+ Reviewed-on: https://code.wireshark.org/review/32211
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit f398a0e267adcf823b63d266e1581abc2bc09eb6)
+ Reviewed-on: https://code.wireshark.org/review/32217
+
+commit 9f49813328
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue Feb 26 15:48:28 2019 -0800
+
+ Prep for 2.4.13.
+
+ Change-Id: I79592eaf21fdf3da7dab8970e538f50e9b545296
+ Reviewed-on: https://code.wireshark.org/review/32214
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 817738126c
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Feb 26 14:16:52 2019 -0800
+
+ The non-flag arguments to tshark aren't necessarily a capture filter.
+
+ They're a capture filter if you're capturing live traffic; they're a
+ display (read) filter if you're reading a capture file.
+
+ Change-Id: Ia2f5bcdb0098bf3c2b4a3d99da5bfe768e09b5a0
+ Reviewed-on: https://code.wireshark.org/review/32207
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit a302d531e898e0c7bb109e49889218b368a8f379)
+ Reviewed-on: https://code.wireshark.org/review/32210
+
+commit 38680c4c69
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Tue Feb 26 15:33:32 2019 +0100
+
+ netscaler: fix multiple out-of-bounds reads.
+
+ Multiple bugs have been found in the provided bug. Some of them have
+ been fixed in gefe920a, others here. The main problem is when malformed
+ files give wrong lenghts to the code, that casts and dereference it
+ without checking, causing oob reads. The fix introduces a check function
+ that prevents to go beyond the limits, early returning with a malformed
+ file message.
+
+ Other bugs have been fixed by forcing the string terminator that allows
+ the use of strlen() and MIN() that prevent wrong reads.
+
+ Conflicts:
+ wiretap/netscaler.c
+
+ Bug: 15497
+ Change-Id: I8411208b5ea0f1a0720a17b882f704d03296d1c4
+ Reviewed-on: https://code.wireshark.org/review/32194
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 07bb974bcd99467381dddae134f11a6f21cf6ca5)
+ Reviewed-on: https://code.wireshark.org/review/32200
+
+commit cab0cff6ab
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Mon Feb 18 14:34:28 2019 +0100
+
+ netscaler: fix crash when reading malformed packets.
+
+ When reading a malformed packet, it can occur that we go close to
+ the end of the buffer. We need to check if we have 2 bytes before
+ reading a uint16.
+
+ Bug: 15497
+ Change-Id: I2b00f44933ca11b925ffbf05b9855684feebcda5
+ Reviewed-on: https://code.wireshark.org/review/32028
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit efe920af3a9f4d7a35c427ceaf4f95e31050f4d3)
+ Reviewed-on: https://code.wireshark.org/review/32197
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 7f3f1a1e70
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Feb 24 09:06:24 2019 +0000
+
+ [Automatic update for 2019-02-24]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Idb57c00f653d71bb8643e4b5a715ef1199038a96
+ Reviewed-on: https://code.wireshark.org/review/32183
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 8aae8b9ee4
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Feb 23 11:21:06 2019 -0800
+
+ Fix liblzma, liblz4, and libssh builds with minimum deployment version and SDK.
+
+ liblzma is used by libxml2, which is used by libwireshark, so we need
+ it. It's build by xz, so we need to do the xz build with the
+ minimum-version and SDK flags.
+
+ liblz4 does its builds in its own unique way; it appears we need to set
+ MOREFLAGS to include the relevant flas.
+
+ libssh is built with CMake, so you have to do special magic to set the
+ SDK path; do it by running cmake with the MACOSX_DEPLOYMENT_TARGET and
+ SDKROOT environment variables.
+
+ Change-Id: Ia588632e5047c4a8a22fe6ef3a0844cfe7722df2
+ Reviewed-on: https://code.wireshark.org/review/32171
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 1048b82ca34ce9e3cdd128e6883a27a76bff3ab7)
+ Reviewed-on: https://code.wireshark.org/review/32174
+
+commit 573f8f72f2
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Feb 22 12:36:04 2019 -0800
+
+ Add -D_FORTIFY_SOURCE=0 for C++ if we're using it for C.
+
+ Change-Id: Ideaba2faaa7b968947f7af90b41c40a8edb4d3c2
+ Reviewed-on: https://code.wireshark.org/review/32160
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 372b9657a61bbf88edf5f50ee3b91cdc743c222e)
+ Reviewed-on: https://code.wireshark.org/review/32163
+
+commit f807595872
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Feb 22 12:25:46 2019 -0800
+
+ Set CXXFLAGS and LDFLAGS for all libraries.
+
+ If a minimum version number is specified, we need them all built with
+ that and with the selected SDK.
+
+ Change-Id: I84b98c67c64da12d3a3b234a41991675a71aeb82
+ Reviewed-on: https://code.wireshark.org/review/32156
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 1798a3f29561911b7a3587fe9ce0dcc849237847)
+ Reviewed-on: https://code.wireshark.org/review/32159
+
+commit 60a45aef26
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Feb 22 11:59:10 2019 -0800
+
+ Get rid of extra space between environment variable settings.
+
+ Change-Id: Ie200d728f4c98f37ad71a62218b82767cef660b2
+ Reviewed-on: https://code.wireshark.org/review/32152
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit ce2dadda9f08c3548aa8dc5684d9dbf597e0a39c)
+ Reviewed-on: https://code.wireshark.org/review/32155
+
+commit cec44bc884
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Feb 22 11:15:58 2019 -0800
+
+ Get rid of duplicate setting of CFLAGS.
+
+ Change-Id: I6f46f6827d66fec58d43195a95888c9d8adf245a
+ Reviewed-on: https://code.wireshark.org/review/32146
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 93423712207ef12a0c23f4cd6475141fab2ec59d)
+ Reviewed-on: https://code.wireshark.org/review/32149
+
+commit 366cddd5f4
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Wed Feb 20 14:25:50 2019 +0100
+
+ Qt: Keep column width and align when edit custom fields
+
+ Reapply the column width and alignment when editing the fields
+ in a custom column.
+
+ Bug: 14177
+ Change-Id: I581ea67505f9181c1e5133c9950f59ed0780b0ba
+ Reviewed-on: https://code.wireshark.org/review/32121
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit c62dadd31f859a60b970f699992a5ddba837a42c)
+ Reviewed-on: https://code.wireshark.org/review/32124
+
+commit b74caac690
+Author: Pascal Quantin <pascal@wireshark.org>
+Date: Tue Feb 19 16:40:21 2019 +0100
+
+ SMB2: fix Chain Offset field endianness
+
+ Bug: 15524
+ Change-Id: I8c51613d49b25061b0372af5347842578cca21ad
+ Reviewed-on: https://code.wireshark.org/review/32104
+ Petri-Dish: Pascal Quantin <pascal@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal@wireshark.org>
+ (cherry picked from commit e2377cf33fa39bfa12e38da5fa69e960e335a596)
+ Reviewed-on: https://code.wireshark.org/review/32106
+
+commit b879c4e381
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Feb 18 19:58:29 2019 -0800
+
+ Use #defines for long-option codes.
+
+ Change-Id: Ife800efd4d2621b295a1c07ae182758a3b6f276c
+ Reviewed-on: https://code.wireshark.org/review/32095
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit da70ea1c30ff548851d9e10ba306b2fda8f43186)
+ Reviewed-on: https://code.wireshark.org/review/32098
+
+commit e176198515
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Feb 18 19:12:27 2019 -0800
+
+ Clean up indentation.
+
+ Change-Id: I28280eddda1c318ba82ec8f0372e38093abbaa14
+ Reviewed-on: https://code.wireshark.org/review/32091
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit a325c949bc5466cdd4bdb9b676eb090275953371)
+ Reviewed-on: https://code.wireshark.org/review/32094
+
+commit 0a38daa21e
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Feb 17 09:06:22 2019 +0000
+
+ [Automatic update for 2019-02-17]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Iad74b8d8253f2e8ce5c19b6e5585e9b71ade3684
+ Reviewed-on: https://code.wireshark.org/review/32072
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 642c411801
+Author: Michał Łabędzki <michal.labedzki@wireshark.org>
+Date: Sun Feb 10 18:00:42 2019 +0100
+
+ Qt: Fix Crash in empty Bluetooth windows
+
+ Avoid crashed in context menu in Bluetooth windows when there is no any items.
+ Also add missing last column in "Copy All" in HCI Summary (fix console warning).
+
+ Change-Id: I28af0208c3b1c813d43305f3c0a4bf19f66d3e31
+ Reviewed-on: https://code.wireshark.org/review/31977
+ Petri-Dish: Michal Labedzki <michal.labedzki@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/31981
+ Reviewed-by: Michal Labedzki <michal.labedzki@wireshark.org>
+
+commit 551d48826c
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Fri Feb 8 17:20:37 2019 +0100
+
+ Fix crash when using the "matches" operator on non-UTF-8 data
+
+ GRegex is a thin wrapper around PCRE. Inputs (patterns and subjects) are
+ assumed to be UTF-8 by default (unless G_REGEX_RAW is set). If the
+ subject is not valid UTF-8, normally pcre_exec will immediately return a
+ failure. However, as GLib sets PCRE_NO_UTF8_CHECK when G_REGEX_RAW is
+ given, pcre_exec() will skip the safety check and crash instead.
+
+ Fix this by always assuming raw byte patterns. Regression risk: patterns
+ such as `ö.ï` will no longer match `öñï` since `ñ` is a multi-byte
+ sequence. Patterns such as `(GET|POST) /` remain functional though.
+
+ Bug: 14905
+ Change-Id: I6450bb83f565d377f82a5dbb01690c5f49acd96f
+ Reviewed-on: https://code.wireshark.org/review/31935
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 0ca65a66f425c8beaa1af3deb3b84c2b16cffb55)
+ Reviewed-on: https://code.wireshark.org/review/31972
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit 165e35921f
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Feb 10 09:02:29 2019 +0000
+
+ [Automatic update for 2019-02-10]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I92c8a373ccf1cd030bf7a1443109f733d9381386
+ Reviewed-on: https://code.wireshark.org/review/31957
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit c30da53b3c
+Author: Ivan Nardi <nardi.ivan@gmail.com>
+Date: Mon May 28 17:00:42 2018 +0200
+
+ GTP: fix dissection of GGSN addresses in PDP Context ie
+
+ Bug: 15485
+ Change-Id: I468d253016118887ef90e57f179e3413cca14e40
+ Reviewed-on: https://code.wireshark.org/review/27889
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit db009f4b0778d41ed71c4887087cb99d8423aa97)
+ Reviewed-on: https://code.wireshark.org/review/31924
+ Petri-Dish: Pascal Quantin <pascal@wireshark.org>
+ Reviewed-by: Ivan Nardi <nardi.ivan@gmail.com>
+ Reviewed-by: Pascal Quantin <pascal@wireshark.org>
+ (cherry picked from commit b10de7b1cfea331678d49efa8c019c70ca6e1b48)
+ Reviewed-on: https://code.wireshark.org/review/31926
+
+commit 4059f48932
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Wed Feb 6 13:32:51 2019 +0100
+
+ wslua: do not load console.lua when run as root
+
+ dofile is currently disabled whenever Wireshark or tshark was started as
+ root, calling it will result in Lua errors on startup.
+
+ Even if dofile were not disabled, the Lua Evaluate menu option enables
+ arbitrary Lua code execution. The other options (Console, help links)
+ are not that important either, so just disable it when run as root.
+
+ Change-Id: I0785fe9b3d4678d71ae1e0178811dada471c3525
+ Link: https://www.wireshark.org/lists/wireshark-dev/201902/msg00004.html
+ Reviewed-on: https://code.wireshark.org/review/31912
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit 10ef8b717cb95929d81e4015515dc87fc8c8fc48)
+ Bug: 15489
+ Reviewed-on: https://code.wireshark.org/review/31928
+
+commit 3fd18684ca
+Author: Graham Bloice <graham.bloice@trihedral.com>
+Date: Sun Feb 3 14:14:00 2019 +0000
+
+ dnp3: Update Read Objects list
+
+ Add Binary Output Change to the Read Objects list
+
+ Change-Id: I0e5a67fdba5d8b2412c05bc416feaa0fe81ace15
+ Reviewed-on: https://code.wireshark.org/review/31862
+ Petri-Dish: Graham Bloice <graham.bloice@trihedral.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Graham Bloice <graham.bloice@trihedral.com>
+ (cherry picked from commit 235d46241d6e2c0e1e4850b17389816c18ca3ed3)
+ Reviewed-on: https://code.wireshark.org/review/31864
+
+commit ae47c9c91f
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Feb 3 08:50:48 2019 +0000
+
+ [Automatic update for 2019-02-03]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I087713d3d6ad50ed6b2313f83ac26931d799ca91
+ Reviewed-on: https://code.wireshark.org/review/31861
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 3d1b8004ed
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Thu Jan 31 15:40:24 2019 +0100
+
+ tcap: check p_tcap_private before dereferencing.
+
+ This caused a NULL pointer dereference on ASAN builds with
+ malformed packets.
+
+ AddressSanitizer:DEADLYSIGNAL
+ =================================================================
+ ==15485==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ff49a4281fa bp 0x7ffe5257a4d0 sp 0x7ffe5257a2c0 T0)
+ ==15485==The signal is caused by a WRITE memory access.
+ ==15485==Hint: address points to the zero page.
+ #0 0x7ff49a4281f9 in dissect_tcap_AARQ_application_context_name wireshark/epan/dissectors/./asn1/tcap/tcap.cnf
+ #1 0x7ff498e7bab1 in dissect_ber_sequence wireshark/epan/dissectors/packet-ber.c:2425:17
+
+ Bug: 15464
+ Change-Id: I8fd4f09a1356211acb180e4598a33fce96d98e94
+ Reviewed-on: https://code.wireshark.org/review/31840
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 34873a20eb489562098c5a58085ae783f869525c)
+ Reviewed-on: https://code.wireshark.org/review/31842
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+
+commit 82c6d79e1b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Jan 31 10:30:38 2019 -0800
+
+ Use find_or_create_conversation().
+
+ 2.4 doesn't have find_conversation_pinfo(), but it does have
+ find_or_create_conversation().
+
+ Change-Id: I70310b21910eabb4aaa5f24f608e574dffc70fe1
+ Reviewed-on: https://code.wireshark.org/review/31845
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit c2fffffbb5
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Wed Jan 30 10:31:02 2019 +0100
+
+ Qt: Restore column width and visibility when switching profiles
+
+ In some cases the column width and/or hidden setting is not correctly applied
+ when switching between profiles having different hidden settings.
+
+ Unhiding the column before applying width and hidden setting fixes this issue.
+
+ Bug: 15466
+ Change-Id: I09e3451612ba6dd0510b19f7f4d84d281b0188b5
+ Reviewed-on: https://code.wireshark.org/review/31812
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit 66c548fdb76d649ecda25da6a1b4e344b8964a64)
+ Reviewed-on: https://code.wireshark.org/review/31833
+
+commit 064b81a86b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Jan 31 00:59:01 2019 -0800
+
+ Also check whether we have nothing but DLCI bytes.
+
+ The two failure modes are 1) no byte has the low-order bit set, so we
+ didn't even find the end of the DLCI or 2) the byte at the end of the
+ packet has the low-order bit set, so that it's all DLCI with no control
+ byte after it.
+
+ Expand a comment.
+
+ Bug: 15463
+ Change-Id: Ib76686391213dd56c06d665aa87a188621fe6816
+ Reviewed-on: https://code.wireshark.org/review/31828
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit b5817dbda7de860e8e89cca5d1217d948c065259)
+ Reviewed-on: https://code.wireshark.org/review/31830
+
+commit fd34a9174f
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jan 30 23:39:54 2019 -0800
+
+ Check whether you've hit the end of the packet data before going further.
+
+ If we found no bytes with the low-order bit set in the packet data,
+ there's no point in checking the non-existent "next" byte to see if it's
+ a HDLC-style UI control byte (0x03).
+
+ Bug: 15463
+ Change-Id: Ibfd186e5b81d8ce229362e23f00b31a27900831a
+ Reviewed-on: https://code.wireshark.org/review/31824
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 498b64c95c13980505e495bad33d911c26c52b8a)
+ Reviewed-on: https://code.wireshark.org/review/31826
+
+commit cb34e172af
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Jan 30 22:56:50 2019 -0800
+
+ Rpcap authentication replies now have an optional payload.
+
+ Change-Id: Id1ac1e12feb69573bed9bc419c819235da053867
+ Reviewed-on: https://code.wireshark.org/review/31820
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 660e63aaf30a70444a601bf23f8419f8b5848b27)
+ Reviewed-on: https://code.wireshark.org/review/31822
+
+commit 322cc03b9c
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Tue Jan 29 12:02:02 2019 -0800
+
+ Once we've identified a TCP segment as rpcap, use rpcap for the connection.
+
+ One reason to use Wireshark is to diagnose protocol errors, so don't,
+ for example, treat too-short packets, in a TCP connection where we've
+ already seen rpcap packets, as not being rpcap packets. (Yes, that *is*
+ a bug, in the libpcap master, that I found and fixed.)
+
+ Change-Id: I9a81e5b9a2910331574164395302247a446e805b
+ Reviewed-on: https://code.wireshark.org/review/31809
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit d58a3ffe4f69366f25fd192e41a89b4769c7d22c)
+ Reviewed-on: https://code.wireshark.org/review/31811
+
+commit 1011d68e94
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jan 28 14:23:13 2019 -0800
+
+ Further improve that error message.
+
+ Put the function name in quotes.
+
+ Change-Id: I09be392a9bac3b56c13b82a554d17ea29695657c
+ Reviewed-on: https://code.wireshark.org/review/31790
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 7d4b47a0734c02df279ca983a017e1dfb4e35d12)
+ Reviewed-on: https://code.wireshark.org/review/31792
+
+commit 838b130d7d
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jan 28 14:08:02 2019 -0800
+
+ Fix an error message.
+
+ I guess "s" in "The function s" was supposed to be "%s", giving the
+ function name. Make it so, and properly fetch the function name.
+
+ Change-Id: I67287f24626fa0a2816fb2cf574e5d9ff58713bf
+ Reviewed-on: https://code.wireshark.org/review/31787
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit e8f54b8aed64d586bd0893e2c8b44bb42731761b)
+ Reviewed-on: https://code.wireshark.org/review/31789
+
+commit 05bd23dfb3
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Mon Jan 28 10:48:43 2019 -0800
+
+ Update a column to reflect the underlying issue.
+
+ See
+
+ https://code.wireshark.org/review/c/31755/#message-d73e5c7c_eed569dc
+
+ for the details.
+
+ Change-Id: Ib4f28d843a96ec30daa263f49ac2620bfecba718
+ Reviewed-on: https://code.wireshark.org/review/31780
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 90cf07501682bd0e654b731ea2240ed3009769e3)
+ Reviewed-on: https://code.wireshark.org/review/31784
+
+commit fc0e8d32d9
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Sat Jan 26 23:20:20 2019 +0100
+
+ rpc: don't set fence on COL_PROTOCOL.
+
+ That would prevent subsequent protocols to clear it, resulting in multiple
+ definitions in that column.
+
+ An example is NFS as next protocol. When contains multiple NFS operations,
+ COL_PROTOCOL contains NFSNFSNFS...
+
+ Bug: 15443
+ Change-Id: Idf9469873164160dc4795589c61c342ce019521b
+ Reviewed-on: https://code.wireshark.org/review/31755
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ (cherry picked from commit 5b226240c6586b10dccf4ec573f9732097bebcd6)
+ Reviewed-on: https://code.wireshark.org/review/31782
+
+commit f8fbe9f934
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Sat Jan 26 17:10:53 2019 +0100
+
+ BER: don't use invalid time offsets.
+
+ 4 digits values could overflow the destination buffer. Skip them
+ since they're invalid and can only from tainted data.
+
+ Bug: 15447
+ Change-Id: Ice6d4f144597499483160ecaa63702025ab86f61
+ Reviewed-on: https://code.wireshark.org/review/31751
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit cb47fe6b05a70776fdd6df4a84be26f8361587ea)
+ Reviewed-on: https://code.wireshark.org/review/31778
+
+commit 77254d840b
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jan 27 08:46:47 2019 +0000
+
+ [Automatic update for 2019-01-27]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ic13e3c2df7168b3ea0502280738bcc81a3e1383d
+ Reviewed-on: https://code.wireshark.org/review/31761
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 6583921a61
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri Jan 25 15:22:46 2019 +0100
+
+ ETSI CAT: do not call tvb_bytes_to_str() with a 0 length
+
+ Change-Id: Ibd8ebe801a7bb0196e9d0f8e1c19cc16050a4f60
+ Reviewed-on: https://code.wireshark.org/review/31733
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 75484b106da95c3fe73815fca10a6f8208e066cc)
+ Reviewed-on: https://code.wireshark.org/review/31737
+
+commit 5c361aba1b
+Author: Aurelien Aptel <aaptel@suse.com>
+Date: Tue Jan 22 15:37:54 2019 +0100
+
+ smb2: correct small typos
+
+ Change-Id: I140040e3bdac8b15880d8fb1b6ee8857bde6b2ce
+ Reviewed-on: https://code.wireshark.org/review/31671
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 7898405797d9d361dff9b0fe71473a879e1fad70)
+ Reviewed-on: https://code.wireshark.org/review/31673
+
+commit 897d370acb
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jan 20 08:50:35 2019 +0000
+
+ [Automatic update for 2019-01-20]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I7ddaa7f7668ca7b634bc0ac42f46ec83926a090d
+ Reviewed-on: https://code.wireshark.org/review/31627
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit dc9220e1bb
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jan 19 13:55:45 2019 -0800
+
+ Rename a Boolean flag variable to reflect the non-default behavior.
+
+ This makes it slightly clearer, from code inspection, what the -C flag
+ does. The default behavior is to continue; -C cause capinfos to stop,
+ rather than continue, after an open failure.
+
+ Change-Id: I8bc67ce61c5d828c7f0ed87ee397ef994ff99aa4
+ Reviewed-on: https://code.wireshark.org/review/31621
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 0c89d8c33ac18b004fbac587aaf8d60f5ad78555)
+ Reviewed-on: https://code.wireshark.org/review/31623
+
+commit b31aefed46
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jan 19 21:39:36 2019 +0000
+
+ Revert "Change comment to reflect reality."
+
+ This reverts commit b32c8432c76ab9e86fb1fd796fa5600d181e02ae.
+
+ Reason for revert: the variable name was confusing - it describes
+ the behavior if the -C flag is *absent*, and -C sets it to *false*.
+
+ Change-Id: Ia4d2fb954466b710db3fd1b9897feb9f3818c3a9
+ Reviewed-on: https://code.wireshark.org/review/31618
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 4b6dbf4baf7cd06bd7936d622ff351ff4039ce29)
+ Reviewed-on: https://code.wireshark.org/review/31620
+
+commit 0b09d5ced6
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Jan 19 13:34:14 2019 -0800
+
+ Change comment to reflect reality.
+
+ When the -C flag was added, it meant (and still means) "[C]ontinue after
+ open errors", which was new behavior; the default "exit on open errors"
+ behavior was not changed.
+
+ Change-Id: I066c1aaef544e57efb39404e2dd61acbd9a91754
+ Reviewed-on: https://code.wireshark.org/review/31614
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit b32c8432c76ab9e86fb1fd796fa5600d181e02ae)
+ Reviewed-on: https://code.wireshark.org/review/31616
+
+commit 2a2cd1798b
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Sat Jan 19 14:26:54 2019 +0100
+
+ MEGACO: fix dissection of Remote Descriptor
+
+ Display the right field name.
+
+ Bug: 15430
+ Change-Id: I1d7da96a351bfad275142a36975df294bfec1a50
+ Reviewed-on: https://code.wireshark.org/review/31608
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit d89d98b66d17138ea8458d3be74f17d8ab9fb5e3)
+ Conflicts:
+ epan/dissectors/packet-megaco.c
+ Reviewed-on: https://code.wireshark.org/review/31611
+ (cherry picked from commit 75bcd2247e40f2088a133bbf8aca6a89bc20b626)
+ Reviewed-on: https://code.wireshark.org/review/31612
+
+commit 07f56a096a
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Jan 18 10:54:31 2019 -0800
+
+ Windows: Upgrade libxml2 to 2.9.9.
+
+ Change-Id: I8e5dec96850ab5bbe32afe4d1ffa15e707ef2cc8
+ Reviewed-on: https://code.wireshark.org/review/31597
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ec88bff32d
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Thu Jan 17 11:42:26 2019 +0100
+
+ docbook: use fixed space section for filters code.
+
+ Change-Id: I6052bc3ec9705a272d0cd6f31cf8b5c1f4b8d45c
+ Reviewed-on: https://code.wireshark.org/review/31573
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 18cd173974b449ade57f91021996068ade5dff96)
+ Reviewed-on: https://code.wireshark.org/review/31589
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+
+commit 8ff15c1935
+Author: Oliver Smith <osmith@sysmocom.de>
+Date: Tue Jan 15 15:26:33 2019 +0100
+
+ BSSAP: fix typo imesiv -> imeisv
+
+ Change-Id: If92783c2dc57d3cf35b8a2a7c2fcb72e5219c0ad
+ Reviewed-on: https://code.wireshark.org/review/31555
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 8f3f842d9a3eedc2d7b497eb5c5607c8438edc18)
+ Reviewed-on: https://code.wireshark.org/review/31557
+
+commit 96c70ffcf8
+Author: Uli Heilmeier <uh@heilmeier.eu>
+Date: Sat Jan 12 12:46:36 2019 +0100
+
+ MPLS Echo: Fix length for FEC stack elements
+
+ For the length we don't need to add another 4 bytes.
+
+ Change-Id: I276801ab4c5c6a1d9e37b55956f352c16b673db8
+ Ping-Bug: 15413
+ Reviewed-on: https://code.wireshark.org/review/31510
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 178d81f8047f36a68fdef6eaefa8990eaa560a49)
+ Reviewed-on: https://code.wireshark.org/review/31533
+
+commit a93e0984e0
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Jan 13 08:49:37 2019 +0000
+
+ [Automatic update for 2019-01-13]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I11fbf3ad8396eaaa85ac29b66879954d15e0c0a9
+ Reviewed-on: https://code.wireshark.org/review/31524
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit dbf11f87df
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Jan 11 18:20:27 2019 -0800
+
+ Use sentence case for the title, as we do for other documents.
+
+ Change-Id: I72b1676bdc2af41031535e75189c0c15fdf7e551
+ Reviewed-on: https://code.wireshark.org/review/31506
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 6580499311217e52dbfb241c9452000d7c4443ea)
+ Reviewed-on: https://code.wireshark.org/review/31508
+
+commit d2013bff1d
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Jan 11 14:31:01 2019 -0800
+
+ Add captype and reordercap to the list of command-line binaries.
+
+ Change-Id: I7e9460960b83d673727aca1783c03952622aabb5
+ Reviewed-on: https://code.wireshark.org/review/31500
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 16c1f480748ae09c1264cd5d280bae605eb02bd2)
+ Reviewed-on: https://code.wireshark.org/review/31502
+
+commit cdf16da0e0
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Jan 11 12:06:38 2019 -0800
+
+ Include the reordercap and dftest documentation in Windows packages.
+
+ We package the documentation for other programs we supply, so we should
+ package the documentation for them as well.
+
+ Change-Id: I37854631bad4aa799fb6ebb009bea3f4692fe530
+ Reviewed-on: https://code.wireshark.org/review/31492
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 265518a4348b898ea62266c63c78ae8970213be4)
+ Reviewed-on: https://code.wireshark.org/review/31495
+
+commit 415be2ae4e
+Author: Michael Mann <mmann78@netscape.net>
+Date: Fri Jun 23 08:13:06 2017 -0400
+
+ Add dftest to Windows installer.
+
+ Bug: 13825
+ Change-Id: Ibda27599739a26a388e1c66ae813ff5c2c8339be
+ Reviewed-on: https://code.wireshark.org/review/22367
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 635b3720b5a43ed4b3bb1f030033d25675a390b3)
+ Reviewed-on: https://code.wireshark.org/review/31494
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 8d4b7fd71e
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue Jan 8 13:36:22 2019 -0800
+
+ 2.4.12 → 2.4.13.
+
+ Change-Id: Id53e414dfac661068ba6f7122427827767680e1d
+ Reviewed-on: https://code.wireshark.org/review/31461
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
diff --git a/NEWS b/NEWS
index c9f0475fec..e94604c61f 100644
--- a/NEWS
+++ b/NEWS
@@ -1,4 +1,4 @@
- Wireshark 2.4.12 Release Notes
+ Wireshark 2.4.13 Release Notes
__________________________________________________________________
What is Wireshark?
@@ -12,38 +12,33 @@ What's New
Bug Fixes
The following vulnerabilities have been fixed:
- * [1]wnpa-sec-2019-02 The P_MUL dissector could crash. [2]Bug 15337.
- [3]CVE-2019-5717.
- * [4]wnpa-sec-2019-03 The RTSE dissector and other dissectors could
- crash. [5]Bug 15373. [6]CVE-2019-5718.
- * [7]wnpa-sec-2019-04 The ISAKMP dissector could crash. [8]Bug 15374.
- [9]CVE-2019-5719.
- * [10]wnpa-sec-2019-05 The ISAKMP dissector could crash. [11]Bug
- 14470.
+ * [1]wnpa-sec-2019-06 ASN.1 BER and related dissectors crash. [2]Bug
+ 15447. [3]CVE-2019-9209.
+ * [4]wnpa-sec-2019-07 TCAP dissector crash. [5]Bug 15464.
+ [6]CVE-2019-9208.
+ * [7]wnpa-sec-2019-08 RPCAP dissector crash. [8]Bug 15536.
The following bugs have been fixed:
- * console.lua not found in a folder with non-ASCII characters in its
- name. [12]Bug 15118.
- * Disabling Update list of packets in real time. will generally
- trigger crash after three start capture, stop capture cycles.
- [13]Bug 15263.
- * UDP Multicast Stream double counts. [14]Bug 15271.
- * text2pcap et al. set snaplength to 64kiB-1, while processing frames
- of 256kiB. [15]Bug 15292.
- * Builds without libpcap fail if the libpcap headers aren't
- installed. [16]Bug 15317.
- * TCAP AnalogRedirectRecord parameter incorrectly coded as mandatory
- in QualReq_rr message. [17]Bug 15350.
- * Wireshark jumps behind other windows when opening UAT dialogs.
- [18]Bug 15366.
- * Pathnames containing non-ASCII characters are mangled in error
- dialogs on Windows. [19]Bug 15367.
- * Executing -z http,stat -r file.pcapng throws a segmentation fault.
- [20]Bug 15369.
- * IS-41 TCAP RegistrationNotification Invoke has borderCellAccess
- parameter coded as tag 50 (as denyAccess) but should be 58. [21]Bug
- 15372.
- * GTPv2 APN dissect problem. [22]Bug 15383.
+ * dftest should be distributed with the Windows installer. [9]Bug
+ 13825.
+ * Alignment Lost after Editing Column. [10]Bug 14177.
+ * Crash on applying display filters or coloring rules on capture
+ files containing non-UTF-8 data. [11]Bug 14905.
+ * Decoding of MEGACO/H.248 request shows the Remote descriptor as
+ "Local descriptor". [12]Bug 15430.
+ * Repeated NFS in Protocol Display field. [13]Bug 15443.
+ * Wireshark heap out-of-bounds read in infer_pkt_encap. [14]Bug
+ 15463.
+ * Column width and hidden issues when switching profiles. [15]Bug
+ 15466.
+ * GTPv1-C SGSN Context Response / Forward Relocation Request decode
+ GGSN address IPV6 issue. [16]Bug 15485.
+ * Lua Error on startup: init.lua: dofile has been disabled due to
+ running Wireshark as superuser. [17]Bug 15489.
+ * Multiple out-of-bounds reads in NetScaler trace handling
+ (wiretap/netscaler.c). [18]Bug 15497.
+ * Wrong endianess when dissecting the "chain offset" in SMB2 protocol
+ header. [19]Bug 15524.
New and Updated Features
@@ -55,11 +50,12 @@ What's New
Updated Protocol Support
- ANSI MAP, ENIP, GSM A, GTPv2, IMF, ISAKMP, P_MUL, RTSE, and TCAP
+ ASN.1 BER, BSSAP, DNP3, ETSI CAT, GTP, MEGACO, MPLS Echo, RPC, RPCAP,
+ SMB2, and TCAP
New and Updated Capture File Support
- There is no new or updated capture file support in this release.
+ NetScaler, and Sniffer
New and Updated Capture Interfaces support
@@ -70,14 +66,14 @@ What's New
Getting Wireshark
Wireshark source code and installation packages are available from
- [23]https://www.wireshark.org/download.html.
+ [20]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
- found on the [24]download page on the Wireshark web site.
+ found on the [21]download page on the Wireshark web site.
__________________________________________________________________
File Locations
@@ -90,76 +86,73 @@ File Locations
Known Problems
- Dumpcap might not quit if Wireshark or TShark crashes. ([25]Bug 1419)
+ Dumpcap might not quit if Wireshark or TShark crashes. ([22]Bug 1419)
- The BER dissector might infinitely loop. ([26]Bug 1516)
+ The BER dissector might infinitely loop. ([23]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
- ([27]Bug 1814)
+ ([24]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
- ([28]Bug 2234)
+ ([25]Bug 2234)
- Application crash when changing real-time option. ([29]Bug 4035)
+ Application crash when changing real-time option. ([26]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
- ([30]Bug 4985)
+ ([27]Bug 4985)
- Wireshark should let you work with multiple capture files. ([31]Bug
+ Wireshark should let you work with multiple capture files. ([28]Bug
10488)
__________________________________________________________________
Getting Help
- Community support is available on [32]Wireshark's Q&A site and on the
+ Community support is available on [29]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [33]the web site.
+ all of Wireshark's mailing lists can be found on [30]the web site.
Official Wireshark training and certification are available from
- [34]Wireshark University.
+ [31]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [35]Wireshark web site.
+ A complete FAQ is available on the [32]Wireshark web site.
__________________________________________________________________
- Last updated 2019-01-08 18:12:46 UTC
+ Last updated 2019-02-27 17:41:14 UTC
References
- 1. https://www.wireshark.org/security/wnpa-sec-2019-02.html
- 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5717
- 4. https://www.wireshark.org/security/wnpa-sec-2019-03.html
- 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5718
- 7. https://www.wireshark.org/security/wnpa-sec-2019-04.html
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5719
- 10. https://www.wireshark.org/security/wnpa-sec-2019-05.html
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14470
- 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15118
- 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15263
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15271
- 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15292
- 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15317
- 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15350
- 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15366
- 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15367
- 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15369
- 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15372
- 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15383
- 23. https://www.wireshark.org/download.html
- 24. https://www.wireshark.org/download.html#thirdparty
- 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
- 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
- 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
- 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
- 32. https://ask.wireshark.org/
- 33. https://www.wireshark.org/lists/
- 34. http://www.wiresharktraining.com/
- 35. https://www.wireshark.org/faq.html
+ 1. https://www.wireshark.org/security/wnpa-sec-2019-06.html
+ 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
+ 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9209
+ 4. https://www.wireshark.org/security/wnpa-sec-2019-07.html
+ 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
+ 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9208
+ 7. https://www.wireshark.org/security/wnpa-sec-2019-08.html
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
+ 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13825
+ 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14177
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14905
+ 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15430
+ 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15443
+ 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15463
+ 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15466
+ 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15485
+ 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15489
+ 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
+ 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15524
+ 20. https://www.wireshark.org/download.html
+ 21. https://www.wireshark.org/download.html#thirdparty
+ 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
+ 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
+ 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
+ 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 29. https://ask.wireshark.org/
+ 30. https://www.wireshark.org/lists/
+ 31. http://www.wiresharktraining.com/
+ 32. https://www.wireshark.org/faq.html
diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc
index 941d0b7d0b..dd4a2756cb 100644
--- a/docbook/release-notes.asciidoc
+++ b/docbook/release-notes.asciidoc
@@ -17,7 +17,7 @@ The following vulnerabilities have been fixed:
* wssalink:2019-06[]
ASN.1 BER and related dissectors crash.
wsbuglink:15447[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-9209[].
// Fixed in master: 3cd5ac36e2
// Fixed in master-2.6: d632d88025
// Fixed in master-2.4: f8fbe9f934
@@ -25,11 +25,19 @@ wsbuglink:15447[].
* wssalink:2019-07[]
TCAP dissector crash.
wsbuglink:15464[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-9208[].
// Fixed in master: 34873a20eb
// Fixed in master-2.6: 03c674b21b
// Fixed in master-2.4: 3d1b8004ed
+* wssalink:2019-08[]
+RPCAP dissector crash.
+wsbuglink:15536[].
+// cveidlink:2019-xxxx[].
+// Fixed in master: 2f048c932d
+// Fixed in master-2.6: c32d343ff4
+// Fixed in master-2.4: c557bb0910
+
The following bugs have been fixed:
//* wsbuglink:5000[]
diff --git a/version.conf b/version.conf
index b999997703..cc8d9d1108 100644
--- a/version.conf
+++ b/version.conf
@@ -1,9 +1,9 @@
# Interim releases: Enable packaging, add an "rc" to the version.
-enable: 1
-pkg_format: rc0-%#
-pkg_enable: 1
+#enable: 1
+#pkg_format: rc0-%#
+#pkg_enable: 1
# Final release: Disable package version stamps.
-#enable: 1
-#pkg_format:
-#pkg_enable: 0
+enable: 1
+pkg_format:
+pkg_enable: 0