aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--ChangeLog724
-rw-r--r--NEWS151
-rw-r--r--docbook/release-notes.asciidoc14
-rw-r--r--version.conf12
4 files changed, 813 insertions, 88 deletions
diff --git a/ChangeLog b/ChangeLog
index e69de29bb2..2ca8f8c144 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -0,0 +1,724 @@
+commit 1816c75478
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Apr 5 16:01:36 2019 -0700
+
+ Prep for 2.4.14.
+
+ Change-Id: I1df1cc6e3c634aae1a6c001af8a2d0849f9ad9e2
+
+commit 7a347fb25c
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Apr 7 19:56:22 2019 -0700
+
+ If you use data_file_url(), you must first call init_progfile_dir().
+
+ And if you call init_progfile_dir(), you must call
+ init_process_policies() before that.
+
+ And even if you *don't* use data_file_url(), you might use it in the
+ future, or you might use other calls to get data file paths, so make
+ *all* the extcap programs make those calls.
+
+ (Yes, this is important on macOS, for example; it may also be important
+ on Windows. On other UN*Xes we may just compile in the data file path,
+ but that's not true on *all* our platforms.)
+
+ Change-Id: I99265ed69ec24096884ec067feddd7d7f3855436
+ Reviewed-on: https://code.wireshark.org/review/32775
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (backported from commit bbc8cbfb9c0f4b43834af43e518de085cc39fd6b)
+ Reviewed-on: https://code.wireshark.org/review/32778
+
+commit ceef63fa52
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Apr 7 09:06:16 2019 +0000
+
+ [Automatic update for 2019-04-07]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I3bbfed0a32276eb3cd5a552f6fe6f28749910ccc
+ Reviewed-on: https://code.wireshark.org/review/32771
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 6e9562d710
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Apr 5 10:01:56 2019 -0700
+
+ Make call_dissector assertions non-fatal.
+
+ Replace g_assert in our call_dissector* routines with DISSECTOR_ASSERT.
+
+ Change-Id: I76104ba09e272ff34e3eaa958c7f711e27e4a3b5
+ Reviewed-on: https://code.wireshark.org/review/32741
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 98bcda594ecbe3de891bf78cfb262986d1e2b8d6)
+ Reviewed-on: https://code.wireshark.org/review/32757
+
+commit fb8252b26b
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Apr 5 11:52:02 2019 -0700
+
+ Release note updates.
+
+ Change-Id: I7c3d114af267c3a8bc32b899bc2338de9a3dc529
+ Reviewed-on: https://code.wireshark.org/review/32753
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit eafdcfa4b6
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Sun Mar 17 00:47:02 2019 +0100
+
+ dcerpc: ensure the length in the packet doesn't overcome the boundaries.
+
+ The spoolss dissector creates a new source using the length from the packet
+ data. If it overcomes the ends of the packet we hit a crash. In this case
+ add an expert info and stop the dissection
+
+ Bug: 15568
+ Change-Id: Idfb0b54c1f41842170d3d03c80897a3b7edc9400
+ Reviewed-on: https://code.wireshark.org/review/32449
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 5aba3ed0cdebc1ec960261e3e9eda87c8408259f)
+ Reviewed-on: https://code.wireshark.org/review/32750
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 1132941c44
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Fri Apr 5 10:39:40 2019 -0700
+
+ Prep for 2.4.14.
+
+ Change-Id: I026600d763ef46985e804006ef778b08ba8bf9c9
+ Reviewed-on: https://code.wireshark.org/review/32744
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 441b6d9071
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Apr 3 09:41:36 2019 -0700
+
+ DOF: Fix alias binding dissection.
+
+ When adding generated IID and OID bytes to the tree, use a zero offset
+ and length like we do elsewhere in the dissector.
+
+ Bug: 15617
+ Change-Id: Id900f2aeeef7926706b417622d452ffa72949e8a
+ (cherry picked from commit ecf03bb37b3345e684890f7eee031cb17a247939)
+ Reviewed-on: https://code.wireshark.org/review/32723
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 651cd91b16b01e3da698b04542da376d946bc54b)
+ Reviewed-on: https://code.wireshark.org/review/32725
+
+commit b16fea2f17
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Fri Mar 1 11:18:53 2019 +0100
+
+ srvloc: check buffer index to prevent heap overflow.
+
+ Bug: 15546
+ Change-Id: I35eee1f6e1127db74339ec7218d7681bd93de59c
+ Reviewed-on: https://code.wireshark.org/review/32285
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 8f15ebed65ceea5c856fce055b5d83fb0c4b597b)
+ Reviewed-on: https://code.wireshark.org/review/32340
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ (cherry picked from commit f43ac1291b80bbccdd1ef3e6118f72e08dc8beac)
+ Reviewed-on: https://code.wireshark.org/review/32722
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit cf801a2507
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Wed Apr 3 09:10:38 2019 +0200
+
+ ldss: add checks on file digest.
+
+ Bug: 15620
+ Change-Id: I600c262f42414dd50c0cf4c1230acfb2a8042212
+ Reviewed-on: https://code.wireshark.org/review/32520
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit 6c3467945cd9bf1242a2dcd4a8fbff32b885391e)
+ Reviewed-on: https://code.wireshark.org/review/32697
+
+commit 24483e4f80
+Author: Pascal Quantin <pascal@wireshark.org>
+Date: Mon Apr 1 09:47:57 2019 +0200
+
+ HL7: do not call proto_reg_handoff_hl7() when changing a preference
+
+ None of the preference require this function to be called again and it
+ it not designed to be called several times (systematically adds the
+ dissector handle).
+
+ Change-Id: I0aca361902e65668c991e26025236c7ebb0fe946
+ Reviewed-on: https://code.wireshark.org/review/32666
+ Reviewed-by: Pascal Quantin <pascal@wireshark.org>
+ Petri-Dish: Pascal Quantin <pascal@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 2f09f6aba4c6bc31fc3330d3e25e54c6fdef8309)
+ Reviewed-on: https://code.wireshark.org/review/32671
+
+commit fb3db8c701
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Mar 31 20:28:20 2019 -0700
+
+ On Windows, don't do console stuff unless we're on a terminal.
+
+ Clean up some code where that was already the case, to make it clearer
+ that it is the case.
+
+ Make that be the case in print_stream_text_alloc().
+
+ Change-Id: If6ef1ded9dad94ffaccb5d214f70c7e4d0844e8a
+ Reviewed-on: https://code.wireshark.org/review/32660
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 2dfb2067d86ee80e420da8c414bfa1edfc39cf1a)
+ Reviewed-on: https://code.wireshark.org/review/32663
+
+commit 1d7ce92f9c
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Mar 31 18:17:57 2019 -0700
+
+ Only put generic values into the print_stream_t structure.
+
+ Put values used only by particular subclasses into the subclass data
+ structure.
+
+ Change-Id: Ibb995ebf18ba24449467e932084fbeef03ad1abf
+ Reviewed-on: https://code.wireshark.org/review/32653
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 8b0615de3b747f588387b64d2b7c05e7f6f51487)
+ Reviewed-on: https://code.wireshark.org/review/32659
+
+commit 3c5c17e6a1
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Mar 31 12:52:27 2019 -0700
+
+ Don't draw the taps if we never got a capture file.
+
+ There's nothing to draw.
+
+ Maybe we should also avoid it if we didn't get any packets.
+
+ Change-Id: If76f7909f78e66b7302d0ab2caa284ca36c43bfb
+ Reviewed-on: https://code.wireshark.org/review/32649
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 511867cdf4a56da9a261cd57e75873ae89a21d8e)
+ Reviewed-on: https://code.wireshark.org/review/32652
+
+commit 52d34c39d3
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Mar 31 12:27:24 2019 -0700
+
+ Fix -z hosts output if it's from a live capture.
+
+ Giving the pathname of a temporary file that will be deleted once TShark
+ exits isn't useful; just refer to "the temporary capture file".
+
+ Change-Id: I7333ac3cef4e4ae1076a5b0e3c46a04e0328d505
+ Reviewed-on: https://code.wireshark.org/review/32645
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 666d77db4540a2520608a2a410532c57b6efab85)
+ Reviewed-on: https://code.wireshark.org/review/32648
+
+commit f1bff6b251
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Mar 31 09:09:17 2019 +0000
+
+ [Automatic update for 2019-03-31]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I1f456c606fb616665c36517555746f9dd112ed75
+ Reviewed-on: https://code.wireshark.org/review/32644
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit b20e5d8aae
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Mon Mar 25 09:56:56 2019 -0700
+
+ GSS-API: Make sure we call a valid dissector.
+
+ Make our unknown dissector handle logic conistent with other parts of
+ the code.
+
+ Conflicts:
+ epan/dissectors/packet-gssapi.c
+
+ Bug: 15613
+ Change-Id: Id0daf9bf0be14b99ec592f4f561cc8935d5cb4a6
+ Reviewed-on: https://code.wireshark.org/review/32576
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ (cherry picked from commit 8cdc95842687feee32856afba8e7087396082158)
+ Reviewed-on: https://code.wireshark.org/review/32586
+ (cherry picked from commit ea75daa28bd6bd6911fd14a8b1734004269a18b8)
+ Reviewed-on: https://code.wireshark.org/review/32588
+
+commit 39199def60
+Author: Anders Broman <anders.broman@ericsson.com>
+Date: Tue Mar 26 17:00:31 2019 +0100
+
+ iso14443: Initialize iso14443_trans->cmd.
+
+ Conflicts:
+ epan/dissectors/packet-iso14443.c
+
+ Bug: 15634
+ Change-Id: Ibaeb063db74055e26805db21875b9085b45c3ebe
+ Reviewed-on: https://code.wireshark.org/review/32581
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
+ Reviewed-on: https://code.wireshark.org/review/32585
+ Petri-Dish: Jeff Morriss <jeff.morriss.ws@gmail.com>
+
+commit 1d77c81810
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Mar 24 21:23:32 2019 +0000
+
+ Revert "iseries: stop scanning a unicode string when the null terminator is hit."
+
+ This reverts commit c599e490281b523df23010ae25307ff002068e17.
+
+ Reason for revert: This completely fails to recognize Unicode iSeries dumps.
+
+ Change-Id: Ie31141879b1bc3608a5dfdcba6887bb6f0018a47
+ Reviewed-on: https://code.wireshark.org/review/32568
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit c1fd0194f42d04c771e38c680b1fde51760233b9)
+ Reviewed-on: https://code.wireshark.org/review/32571
+
+commit dadcd022ba
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Sun Mar 24 16:01:22 2019 +0100
+
+ iseries: stop scanning a unicode string when the null terminator is hit.
+
+ Bug: 15614
+ Change-Id: I1df4992dcd10e7d9a66fc88a0269b70fc065b079
+ Reviewed-on: https://code.wireshark.org/review/32514
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ (cherry picked from commit c599e490281b523df23010ae25307ff002068e17)
+ Reviewed-on: https://code.wireshark.org/review/32564
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+
+commit e5aed6ea17
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Fri Mar 15 15:00:10 2019 +0100
+
+ dof: don't use src/dst addresses if they don't exist.
+
+ Bug: 15617
+ Change-Id: I1177e704d33626d126b7e835e5a8db3162847fbf
+ Reviewed-on: https://code.wireshark.org/review/32442
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit 1ce2918fc885df36293992c27dce34e40d7260f1)
+ Reviewed-on: https://code.wireshark.org/review/32560
+
+commit 43c23fc22c
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Mar 24 09:07:18 2019 +0000
+
+ [Automatic update for 2019-03-24]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ic82c8453cb2b97f74a73cdbdab0e8523440bb85c
+ Reviewed-on: https://code.wireshark.org/review/32555
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ab8d15f072
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Mar 23 12:05:22 2019 -0700
+
+ Restore pinfo->match_uint after the topmost dissector returns.
+
+ That's what dissector_try_uint_new() does, and some tests depend on it.
+
+ Bug: 15630
+ Change-Id: I57934a5e90f83ee6ea0eb539a91826c950530ad3
+ Reviewed-on: https://code.wireshark.org/review/32542
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 80d96e91d248af40b50969702a0e5aafb7132376)
+ Reviewed-on: https://code.wireshark.org/review/32545
+
+commit 6a1301cb83
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Sat Mar 16 19:15:22 2019 +0000
+
+ TLS: fix potential buffer overflow with a malicious SSL 3.0 session
+
+ If a TLS 1.2 cipher suite with SHA384 was in use for a SSL 3.0 session,
+ then the "dgst" buffer in ssl3_check_mac could be overwritten with 24
+ bytes past the end of the buffer. To prevent this issue, restrict the
+ cipher suites that can be used with SSL 3.0.
+
+ I did not verify this theory with an actual capture since it is hard to
+ do so. An attacker would have to (1) create a malicious, non-compliant
+ implementation that (2) creates a network trace, and (3) convince the
+ user to install the required decryption secrets.
+
+ Bug: 15599
+ Change-Id: I2204f10f46209f9473e7f2003bda8aaac634e2e2
+ Reviewed-on: https://code.wireshark.org/review/32441
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit f73a6b4f7692700bec7da297dd425c34c6f8d081)
+ Reviewed-on: https://code.wireshark.org/review/32537
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit 0f0400610f
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Mar 22 12:50:54 2019 -0700
+
+ Don't use dissector_try_uint_new() to call the subdissector.
+
+ See bug 15630 for details.
+
+ Bug: 15630
+ Change-Id: Ib7c9defae77ef8901ff2c8ef91dc50761f6924f2
+ Reviewed-on: https://code.wireshark.org/review/32527
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 2182d9d29421945f99fef15eed1ca080d9d3722f)
+ Reviewed-on: https://code.wireshark.org/review/32530
+
+commit 9484ca3216
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Thu Mar 21 18:25:50 2019 +0100
+
+ randpkt: restore produce_filename in random generation.
+
+ Bug: 15627
+ Change-Id: Iac267a679ca3f935f0e165880bb3127a8715b81c
+ Reviewed-on: https://code.wireshark.org/review/32503
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 64e02c943a07749af30ceeae7ffc6c88183316fe)
+ Reviewed-on: https://code.wireshark.org/review/32510
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+
+commit 5bddde830e
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Mar 17 09:11:08 2019 +0000
+
+ [Automatic update for 2019-03-17]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ib5bbacacfa35ee4f5cbae4435bf3dd260d849cf3
+ Reviewed-on: https://code.wireshark.org/review/32453
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit bfeb259946
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Mar 16 11:47:45 2019 -0700
+
+ Remove incorrectly-inserted "return FALSE;".
+
+ That made PACKET_DESCRIBE() do nothing, causing warnings from the Clang
+ Static Humiliator.
+
+ Change-Id: I6f433cd193b6398d89038e95c7bf5deb24aa186d
+ Reviewed-on: https://code.wireshark.org/review/32437
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 1660f7437198113c0c90cec22daa6abcd3af22cc)
+ Reviewed-on: https://code.wireshark.org/review/32440
+
+commit 842d333ea6
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Mar 16 00:19:17 2019 -0700
+
+ Fix up the checks in nspm_signature_version().
+
+ Move the read out of nspm_signature_version(), to make it a bit clearer
+ what file I/O we do in the open process; have nspm_signature_version()
+ just look for a signature in a single page.
+
+ In the loop in nspm_signature_version(), make sure we have enough of the
+ record header to look at the type and length fields in that header
+ before looking at them and, when we can look at them, make sure the
+ length of the record 1) fits in what remains of the page we're looking
+ at and 2) is big enough to be the length of a signature record.
+
+ Change-Id: I7d625859136e6f39c40b166067fc7efea806d9b0
+ Reviewed-on: https://code.wireshark.org/review/32426
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit c0839e2e2ae347483ad96e8b86ddfe8f2ab95bc0)
+ Reviewed-on: https://code.wireshark.org/review/32431
+
+commit 2fbbde780e
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Tue Mar 5 17:25:24 2019 +0100
+
+ netscaler: add more sanity checks.
+
+ Fix more crashes found in the provided bug report.
+
+ Bug: 15497
+ Change-Id: If84498fa879ad56c8677f8c1442a8dc0e5906003
+ Reviewed-on: https://code.wireshark.org/review/32333
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 134a513dd59315d67866f238459fdee6347f1055)
+ Reviewed-on: https://code.wireshark.org/review/32422
+ (cherry picked from commit fc8367a50516e832be960a9001ccdb09ced9b27f)
+ Reviewed-on: https://code.wireshark.org/review/32430
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 6c61cc4f07
+Author: Dario Lombardo <lomato@gmail.com>
+Date: Thu Mar 14 18:30:54 2019 +0100
+
+ wmem: fix a comment.
+
+ Change-Id: Ie8e4eac95a4db64c376c38c2207667c38788dac5
+ Reviewed-on: https://code.wireshark.org/review/32411
+ Reviewed-by: Dario Lombardo <lomato@gmail.com>
+ Petri-Dish: Dario Lombardo <lomato@gmail.com>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 3b2204e1274c0075da9948573d5b65d60971a8a5)
+ Reviewed-on: https://code.wireshark.org/review/32418
+
+commit fae702c8f2
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Mar 14 03:51:07 2019 -0700
+
+ Ask, in a comment, whether we should do an exact match on signatures.
+
+ Change-Id: I3c6e904a2e8cc843687b69f633fd0dfbf0ec7937
+ Reviewed-on: https://code.wireshark.org/review/32407
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 306ead40b60b7762eacff6bf5aa1c52ec41fb62c)
+ Reviewed-on: https://code.wireshark.org/review/32410
+
+commit d08085753b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Mar 14 03:12:07 2019 -0700
+
+ Fix the test for a NetScaler trace file.
+
+ When testing the signature field against a given version's signature:
+
+ we require that the signature field's size (size, not C
+ null-terminated string length) be at least the size of the
+ signature string (otherwise, it can't possibly match);
+
+ we check to make sure that the first N bytes of the signature
+ field, where N is the size of the version's signature string
+ (not including any terminating '\0' in that string), match the
+ version's signature string.
+
+ I.e., we require that the version's signature string is a prefix of the
+ signature string in the file.
+
+ This does not require that the signature string in the file be
+ null-terminated.
+
+ It also doesn't allow the file's signature string to be a substring of
+ the version's signature string, as that's *NOT* sufficient to identify
+ the file as a NetScaler trace file, especially if we forcibly
+ null-terminate the file's signature string and we trucate it to be
+ zero-length, as, in that case, it's *always* a prefix of the version's
+ signature string, and the file is incorrectly identified as a NetScaler
+ trace file.
+
+ (While we're at it, we make the nspm_signature_isvXXX() routines return
+ true if it *is* and false if it *isn't*, rather than the reverse; having
+ a routine with a name containing "is", and not "isnt", return true if it
+ *isn't* is confusing.)
+
+ Change-Id: I3694773a71b8b63d280e42f146698c82a0f0c332
+ Ping-Bug: 15601
+ Reviewed-on: https://code.wireshark.org/review/32403
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit f18bd4bd68e950a22baa9d7d4f1ed9236b410f68)
+ Reviewed-on: https://code.wireshark.org/review/32406
+
+commit a0b91cd37b
+Author: Michael McTernan <mike.mcternan@wavemobile.com>
+Date: Sun Mar 10 18:25:01 2019 +0100
+
+ GSM A RR: fix Frequency List Variable Bitmap IE dissection
+
+ Bug: 15549
+ Change-Id: Iacd69b718cef2a26084fbb3e34c1e51f7424cf2b
+ Reviewed-on: https://code.wireshark.org/review/32377
+ Petri-Dish: Pascal Quantin <pascal@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Pascal Quantin <pascal@wireshark.org>
+ (cherry picked from commit e901d722e06a6568f0f8a88ae08290ecb0d63927)
+ Reviewed-on: https://code.wireshark.org/review/32380
+
+commit c424bf2f23
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Mar 10 09:07:56 2019 +0000
+
+ [Automatic update for 2019-03-10]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: Ib62f7671b3b7acdfab4bbdb5d9a7834925b9be7e
+ Reviewed-on: https://code.wireshark.org/review/32375
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 23b83a2fb7
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sun Mar 3 15:45:59 2019 -0800
+
+ Discard the upper bits of the "network" field in the file header.
+
+ Libpcap's done that for a while; we should do so as well.
+
+ (Ideally, we should use those bits, but there's an issue with pcapng,
+ where the FCS length in the IDB is described as being in units of bits,
+ but where we're treating it as being in units of bytes, that I'd like to
+ resolve first.)
+
+ Change-Id: Ibcb82f1dcaa8baae5bba55636cea8852a6af814e
+ Reviewed-on: https://code.wireshark.org/review/32303
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit c84f69f7482fea6eb1b86f08811cc2b4547fe05f)
+ Reviewed-on: https://code.wireshark.org/review/32306
+
+commit c526bd6990
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Mar 3 09:07:48 2019 +0000
+
+ [Automatic update for 2019-03-03]
+
+ Update manuf, services enterprise numbers, translations, and other items.
+
+ Change-Id: I36a6c4f0f839de9fb7aefd8e4dc273152d0155ea
+ Reviewed-on: https://code.wireshark.org/review/32298
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ddbd0c6c09
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Mar 2 20:14:44 2019 -0800
+
+ Say what short name already exists, to help the developer somewhat.
+
+ That tells then what name they *can't* use for their file-type plugin,
+ because it's already a built-in file type name in Wireshark.
+
+ Change-Id: Ibbbfda21e1109cf46275008a46b8ea65c8fcf4b5
+ Reviewed-on: https://code.wireshark.org/review/32291
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit a5b5f649ffaba29cef89b4968635dd919f1e0204)
+ Reviewed-on: https://code.wireshark.org/review/32294
+
+commit b2fe8a4fc9
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Feb 28 10:52:41 2019 -0800
+
+ Fix backport.
+
+ Change-Id: I69b3ff4268c3e4db2264467ce4105e399cf58bdb
+ Reviewed-on: https://code.wireshark.org/review/32272
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 1125ece806
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Thu Feb 28 10:44:31 2019 -0800
+
+ Fix our version.
+
+ Change-Id: I4be13eeeb8297620f6b2bff0b310021b2c677a46
+ Reviewed-on: https://code.wireshark.org/review/32270
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 883ab43d56
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Feb 27 16:20:01 2019 -0800
+
+ CMake: Don't build Windows package targets by default.
+
+ Explicitly exclude our various Windows package targets from the Visual
+ Studio default build. This will hopefully keep the 32-bit Windows builder
+ from trying to build the portableapps_runtime target when it shouldn't.
+
+ Conflicts:
+ packaging/nsis/CMakeLists.txt
+ packaging/wix/CMakeLists.txt
+
+ Change-Id: Id8481e92abda9b1a4784b8c8e8b5a1b3f1b4647e
+ Reviewed-on: https://code.wireshark.org/review/32256
+ Petri-Dish: Gerald Combs <gerald@wireshark.org>
+ Tested-by: Petri Dish Buildbot
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+ (cherry picked from commit a0c93f426b0bb3510af3e4657d95bd64e46ed5f8)
+ Reviewed-on: https://code.wireshark.org/review/32266
+
+commit 34ed0bad67
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Feb 27 13:19:37 2019 -0800
+
+ Fix a comment.
+
+ There's no MIC at the end of an unencrypted packet, and thus we're not
+ removing any MIC.
+
+ Change-Id: Ie19790afc573b66f5dd09a4f8afc0fe69895eabe
+ Reviewed-on: https://code.wireshark.org/review/32249
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit a4c8b2d4e6656606961f3c4f7ae31fed906915c1)
+ Reviewed-on: https://code.wireshark.org/review/32252
+
+commit 8e19cd1786
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed Feb 27 13:09:09 2019 -0800
+
+ Fix subset-tvbuff creation.
+
+ Use tvb_new_subset_length(), rather than (incorrectly) attempting to
+ calculate the captured length ourselves.
+
+ Update a comment while we're at it.
+
+ Change-Id: I9f608ee5bf59f261111b2a75900dddad12fb5554
+ Reviewed-on: https://code.wireshark.org/review/32245
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (backported from commit 179d872565be0c7b265397ec639d49aec4e23511)
+ Reviewed-on: https://code.wireshark.org/review/32248
+
+commit 603c31e040
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Feb 27 12:23:08 2019 -0800
+
+ 2.4.13 → 2.4.14.
+
+ Change-Id: Ic463880ad448ee2665c0133656dc5c0afe0bb2d2
+ Reviewed-on: https://code.wireshark.org/review/32244
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
diff --git a/NEWS b/NEWS
index e94604c61f..34b3ac7e2e 100644
--- a/NEWS
+++ b/NEWS
@@ -1,4 +1,4 @@
- Wireshark 2.4.13 Release Notes
+ Wireshark 2.4.14 Release Notes
__________________________________________________________________
What is Wireshark?
@@ -12,33 +12,30 @@ What's New
Bug Fixes
The following vulnerabilities have been fixed:
- * [1]wnpa-sec-2019-06 ASN.1 BER and related dissectors crash. [2]Bug
- 15447. [3]CVE-2019-9209.
- * [4]wnpa-sec-2019-07 TCAP dissector crash. [5]Bug 15464.
- [6]CVE-2019-9208.
- * [7]wnpa-sec-2019-08 RPCAP dissector crash. [8]Bug 15536.
+ * [1]wnpa-sec-2019-09 NetScaler file parser crash. [2]Bug 15497.
+ [3]CVE-2019-10895.
+ * [4]wnpa-sec-2019-10 SRVLOC dissector crash. [5]Bug 15546.
+ [6]CVE-2019-10899.
+ * [7]wnpa-sec-2019-14 GSS-API dissector crash. [8]Bug 15613.
+ [9]CVE-2019-10894.
+ * [10]wnpa-sec-2019-15 DOF dissector crash. [11]Bug 15617.
+ [12]CVE-2019-10896.
+ * [13]wnpa-sec-2019-17 LDSS dissector crash. [14]Bug 15620.
+ [15]CVE-2019-10901.
+ * [16]wnpa-sec-2019-18 DCERPC SPOOLSS dissector crash. [17]Bug 15568.
+ [18]CVE-2019-10903.
The following bugs have been fixed:
- * dftest should be distributed with the Windows installer. [9]Bug
- 13825.
- * Alignment Lost after Editing Column. [10]Bug 14177.
- * Crash on applying display filters or coloring rules on capture
- files containing non-UTF-8 data. [11]Bug 14905.
- * Decoding of MEGACO/H.248 request shows the Remote descriptor as
- "Local descriptor". [12]Bug 15430.
- * Repeated NFS in Protocol Display field. [13]Bug 15443.
- * Wireshark heap out-of-bounds read in infer_pkt_encap. [14]Bug
- 15463.
- * Column width and hidden issues when switching profiles. [15]Bug
- 15466.
- * GTPv1-C SGSN Context Response / Forward Relocation Request decode
- GGSN address IPV6 issue. [16]Bug 15485.
- * Lua Error on startup: init.lua: dofile has been disabled due to
- running Wireshark as superuser. [17]Bug 15489.
- * Multiple out-of-bounds reads in NetScaler trace handling
- (wiretap/netscaler.c). [18]Bug 15497.
- * Wrong endianess when dissecting the "chain offset" in SMB2 protocol
- header. [19]Bug 15524.
+ * GSM-A-RR variable bitmap decoding may report ARFCNs > 1023. [19]Bug
+ 15549.
+
+ * Possible buffer overflow in function ssl_md_final for crafted SSL
+ 3.0 sessions. [20]Bug 15599.
+ * randpkt -r causes segfault when count > 1. [21]Bug 15627.
+ * Packets with metadata but no data get the Protocol Info column
+ overwritten. [22]Bug 15630.
+
+ * Buildbot crash output: fuzz-2019-03-23-1789.pcap. [23]Bug 15634.
New and Updated Features
@@ -50,12 +47,12 @@ What's New
Updated Protocol Support
- ASN.1 BER, BSSAP, DNP3, ETSI CAT, GTP, MEGACO, MPLS Echo, RPC, RPCAP,
- SMB2, and TCAP
+ DCERPC SPOOLSS, DOF, GSM A RR, GSS-API, HL7, IEEE 802.15.4, ISO 14443,
+ LDSS, SRVLOC, and TLS
New and Updated Capture File Support
- NetScaler, and Sniffer
+ NetScaler, and pcap
New and Updated Capture Interfaces support
@@ -66,14 +63,14 @@ What's New
Getting Wireshark
Wireshark source code and installation packages are available from
- [20]https://www.wireshark.org/download.html.
+ [24]https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can be
- found on the [21]download page on the Wireshark web site.
+ found on the [25]download page on the Wireshark web site.
__________________________________________________________________
File Locations
@@ -86,73 +83,77 @@ File Locations
Known Problems
- Dumpcap might not quit if Wireshark or TShark crashes. ([22]Bug 1419)
+ Dumpcap might not quit if Wireshark or TShark crashes. ([26]Bug 1419)
- The BER dissector might infinitely loop. ([23]Bug 1516)
+ The BER dissector might infinitely loop. ([27]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
- ([24]Bug 1814)
+ ([28]Bug 1814)
Filtering tshark captures with read filters (-R) no longer works.
- ([25]Bug 2234)
+ ([29]Bug 2234)
- Application crash when changing real-time option. ([26]Bug 4035)
+ Application crash when changing real-time option. ([30]Bug 4035)
Wireshark and TShark will display incorrect delta times in some cases.
- ([27]Bug 4985)
+ ([31]Bug 4985)
- Wireshark should let you work with multiple capture files. ([28]Bug
+ Wireshark should let you work with multiple capture files. ([32]Bug
10488)
__________________________________________________________________
Getting Help
- Community support is available on [29]Wireshark's Q&A site and on the
+ Community support is available on [33]Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for
- all of Wireshark's mailing lists can be found on [30]the web site.
+ all of Wireshark's mailing lists can be found on [34]the web site.
Official Wireshark training and certification are available from
- [31]Wireshark University.
+ [35]Wireshark University.
__________________________________________________________________
Frequently Asked Questions
- A complete FAQ is available on the [32]Wireshark web site.
+ A complete FAQ is available on the [36]Wireshark web site.
__________________________________________________________________
- Last updated 2019-02-27 17:41:14 UTC
+ Last updated 2019-04-08 18:22:29 UTC
References
- 1. https://www.wireshark.org/security/wnpa-sec-2019-06.html
- 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9209
- 4. https://www.wireshark.org/security/wnpa-sec-2019-07.html
- 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
- 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9208
- 7. https://www.wireshark.org/security/wnpa-sec-2019-08.html
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
- 9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13825
- 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14177
- 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14905
- 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15430
- 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15443
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15463
- 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15466
- 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15485
- 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15489
- 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
- 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15524
- 20. https://www.wireshark.org/download.html
- 21. https://www.wireshark.org/download.html#thirdparty
- 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
- 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
- 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
- 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
- 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
- 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
- 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
- 29. https://ask.wireshark.org/
- 30. https://www.wireshark.org/lists/
- 31. http://www.wiresharktraining.com/
- 32. https://www.wireshark.org/faq.html
+ 1. https://www.wireshark.org/security/wnpa-sec-2019-09.html
+ 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
+ 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10895
+ 4. https://www.wireshark.org/security/wnpa-sec-2019-10.html
+ 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546
+ 6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899
+ 7. https://www.wireshark.org/security/wnpa-sec-2019-14.html
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613
+ 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894
+ 10. https://www.wireshark.org/security/wnpa-sec-2019-15.html
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617
+ 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896
+ 13. https://www.wireshark.org/security/wnpa-sec-2019-17.html
+ 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620
+ 15. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901
+ 16. https://www.wireshark.org/security/wnpa-sec-2019-18.html
+ 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
+ 18. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10903
+ 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15549
+ 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15599
+ 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15627
+ 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15630
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15634
+ 24. https://www.wireshark.org/download.html
+ 25. https://www.wireshark.org/download.html#thirdparty
+ 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
+ 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
+ 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
+ 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
+ 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
+ 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
+ 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488
+ 33. https://ask.wireshark.org/
+ 34. https://www.wireshark.org/lists/
+ 35. http://www.wiresharktraining.com/
+ 36. https://www.wireshark.org/faq.html
diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc
index 3f679c3126..d08cd8117c 100644
--- a/docbook/release-notes.asciidoc
+++ b/docbook/release-notes.asciidoc
@@ -17,7 +17,7 @@ The following vulnerabilities have been fixed:
* wssalink:2019-09[]
NetScaler file parser crash.
wsbuglink:15497[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-10895[].
// Fixed in master: efe920af3a, 07bb974bcd, 134a513dd5
// Fixed in master-3.0: 490b381729, b759633425, 3ced6f5b05
// Fixed in master-2.6: dedcdbcdc4, 213c2c9afb, fc8367a505
@@ -26,7 +26,7 @@ wsbuglink:15497[].
* wssalink:2019-10[]
SRVLOC dissector crash.
wsbuglink:15546[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-10899[].
// Fixed in master: 8f15ebed65
// Fixed in master-3.0: fb94bfef5f
// Fixed in master-2.6: f43ac1291b
@@ -35,7 +35,7 @@ wsbuglink:15546[].
* wssalink:2019-14[]
GSS-API dissector crash.
wsbuglink:15613[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-10894[].
// Fixed in master: 8cdc958426
// Fixed in master-3.0: ea75daa28b
// Fixed in master-2.6: a9c0287976
@@ -44,7 +44,7 @@ wsbuglink:15613[].
* wssalink:2019-15[]
DOF dissector crash.
wsbuglink:15617[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-10896[].
// Fixed in master: b572b65e51
// Fixed in master-3.0: 651cd91b16
// Fixed in master-2.6: a35c64380b
@@ -53,7 +53,7 @@ wsbuglink:15617[].
* wssalink:2019-17[]
LDSS dissector crash.
wsbuglink:15620[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-10901[].
// Fixed in master: 6c3467945c
// Fixed in master-3.0: 1cf349ddb2
// Fixed in master-2.6: d368eed192
@@ -62,7 +62,7 @@ wsbuglink:15620[].
* wssalink:2019-18[]
DCERPC SPOOLSS dissector crash.
wsbuglink:15568[].
-// cveidlink:2019-xxxx[].
+cveidlink:2019-10903[].
// Fixed in master: 5aba3ed0cd
// Fixed in master-3.0: 2f529f8acf
// Fixed in master-2.6: 85499cde33
@@ -74,7 +74,7 @@ The following bugs have been fixed:
//* wsbuglink:6000[Wireshark bug]
//* cveidlink:2014-2486[]
//* Wireshark keeps leaving voicemails advertising timeshare condominiums in Fresno. (wsbuglink:0000[])
-// cp /dev/null /tmp/buglist.txt ; for bugnumber in `git log --stat v2.4.14rc0..| grep ' Bug:' | awk '{print $2}' | sort -n -u ` ; do "$(git rev-parse --show-toplevel)/tools/gen-bugnote" $bugnumber; pbpaste >> /tmp/buglist.txt; done
+// cp /dev/null /tmp/buglist.txt ; for bugnumber in `git log --stat v2.4.15rc0..| grep ' Bug:' | awk '{print $2}' | sort -n -u ` ; do "$(git rev-parse --show-toplevel)/tools/gen-bugnote" $bugnumber; pbpaste >> /tmp/buglist.txt; done
* GSM-A-RR variable bitmap decoding may report ARFCNs > 1023. wsbuglink:15549[].
diff --git a/version.conf b/version.conf
index b999997703..cc8d9d1108 100644
--- a/version.conf
+++ b/version.conf
@@ -1,9 +1,9 @@
# Interim releases: Enable packaging, add an "rc" to the version.
-enable: 1
-pkg_format: rc0-%#
-pkg_enable: 1
+#enable: 1
+#pkg_format: rc0-%#
+#pkg_enable: 1
# Final release: Disable package version stamps.
-#enable: 1
-#pkg_format:
-#pkg_enable: 0
+enable: 1
+pkg_format:
+pkg_enable: 0