aboutsummaryrefslogtreecommitdiffstats
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog1108
1 files changed, 1108 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index e69de29bb2..b98cf53521 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -0,0 +1,1108 @@
+commit e6ace1c
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Fri May 26 15:55:08 2017 +0200
+
+ debian: remove imagemagick and demote xdg-utils deps
+
+ imagemagick was needed since v1.11.1-rc1-140-g02a8e72b43, but
+ unnecessary since v2.1.0rc0-491-g18a54fcaa4, remove it.
+ xdg-utils is needed for xdg-open (opening websites) at runtime in GTK+,
+ but not for Qt nor during the build, remove it or mark it as optional.
+
+ Change-Id: I6fc4d5fb61ea8b5cf79526d92ef8c108bc9d11a3
+ Reviewed-on: https://code.wireshark.org/review/21765
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit 6607be77f30c8b08e2ffb8160d9f5211415decc6)
+ Reviewed-on: https://code.wireshark.org/review/21868
+
+commit ae9b917
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed May 31 12:05:52 2017 -0700
+
+ More 2.2.7 release note updates.
+
+ Change-Id: I86a7ddb4c67175bc88adaacd04403d0010df59c7
+ Reviewed-on: https://code.wireshark.org/review/21864
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit ba35a81
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Tue May 30 16:41:11 2017 -0700
+
+ Update the release notes for 2.2.7.
+
+ Change-Id: I58b3bbec02b25c1647fe7f5cf2a13a618c409ed9
+ Reviewed-on: https://code.wireshark.org/review/21830
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 498392f
+Author: Michael Mann <mmann78@netscape.net>
+Date: Mon May 29 11:30:16 2017 -0400
+
+ GTK: Bugfix not allowing extcap capture filters to be verified.
+
+ Matches Id45052f21ebb290bf92c201370584156a65f2e19
+
+ Change-Id: I2b097d176ec3ce0637af95d66d2f58b834c79ea2
+ Reviewed-on: https://code.wireshark.org/review/21783
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 4e05adcfb20d297d559ae787ac0fcef637d67ef3)
+ Reviewed-on: https://code.wireshark.org/review/21784
+
+commit d79e01e
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Mon May 29 08:51:30 2017 +0200
+
+ Qt: Fix capture filter verification for non-extcap interfaces.
+
+ Change-Id: Id45052f21ebb290bf92c201370584156a65f2e19
+ Reviewed-on: https://code.wireshark.org/review/21777
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 10d7e391b3c9de2ea66a46980bf2362bb79292f3)
+ Reviewed-on: https://code.wireshark.org/review/21781
+
+commit 82a5c9f
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun May 28 08:25:30 2017 +0000
+
+ [Automatic update for 2017-05-28]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: Idce91ff628e3b207716ae6592291bccf4c5c3639
+ Reviewed-on: https://code.wireshark.org/review/21773
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 7791a5c
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu May 25 15:27:18 2017 -0400
+
+ GTK: Don't allow extcap capture filters to be verified.
+
+ There isn't an API to do it and if WinPcap isn't present it can
+ cause a crash.
+
+ Change-Id: I5338f854acb26f0822ac027e6c853a550da3f7b1
+ Reviewed-on: https://code.wireshark.org/review/21758
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit d14b8f6fc5bc727355cd317197fab5b0fb349f4b)
+ Reviewed-on: https://code.wireshark.org/review/21762
+
+commit 5802749
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu May 25 14:36:44 2017 -0400
+
+ Don't try to compile capture filter if pcap_compile isn't available.
+
+ This is most likely due to WinPcap not being installed.
+
+ Bug: 13672
+ Change-Id: Ic7069f98c7f8068cdc5045204c2e23ab56b3f7eb
+ Reviewed-on: https://code.wireshark.org/review/21757
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 9bd2b63968ecde680cdee8e8eff43e526ef178f4)
+ Reviewed-on: https://code.wireshark.org/review/21760
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+
+commit 379ac84
+Author: Eric Wetzel <thewetzel@gmail.com>
+Date: Wed May 17 22:17:30 2017 -0400
+
+ dnp3: fix parser when a packed variation is used with prefix value qualifier
+
+ Bug: 13733
+ Change-Id: I4d490793b54816e731d72bf1317d3779a05ae011
+ Reviewed-on: https://code.wireshark.org/review/21722
+ Petri-Dish: Graham Bloice <graham.bloice@trihedral.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Graham Bloice <graham.bloice@trihedral.com>
+ (cherry picked from commit b3c68951913497d0797614636ef6784becb1a5b6)
+ Reviewed-on: https://code.wireshark.org/review/21729
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 14e28c3
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun May 21 08:26:52 2017 +0000
+
+ [Automatic update for 2017-05-21]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: Id78b574bb69be004f90b92e4d8de6928ca2983c9
+ Reviewed-on: https://code.wireshark.org/review/21724
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 13d52a5
+Author: Jaap Keuter <jaap.keuter@xs4all.nl>
+Date: Fri May 19 00:45:30 2017 +0200
+
+ SDP: Handle incomplete media attributes
+
+ Media attributes have a format of name:value, where, if the value
+ is missing the colon is missing too. Sometimes the colon is there,
+ while the value is missing. Even though this is in error, continue
+ dissecting the other attributes.
+
+ Bug: 13698
+ Change-Id: I369b6db657b33a368f4b12134412100774105615
+ Reviewed-on: https://code.wireshark.org/review/21699
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit e71219c711e80a5534a03ab03e1c412cd53c1998)
+ Reviewed-on: https://code.wireshark.org/review/21715
+ Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+
+commit 2755632
+Author: Björn Ruytenberg <bjorn@bjornweb.nl>
+Date: Fri May 19 19:03:29 2017 +0200
+
+ msnip: Verify pinfo->dst is a valid IPv4 address
+
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
+ Bug: 13725
+ Change-Id: Ib61733200658b4cca0bb0f45e5445b0ed3c12ab0
+ Reviewed-on: https://code.wireshark.org/review/21712
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit b2923e93133e21f18799124eff01156088980456)
+ Reviewed-on: https://code.wireshark.org/review/21713
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+
+commit c6d43ae
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Fri May 19 15:05:06 2017 +0200
+
+ Qt: Add check for packet bytes
+
+ Disable menu items handling packet bytes if not having any.
+
+ Bug: 13723
+ Change-Id: I9cdb1185910f865c61a8ee74e3cf3177159bf315
+ Reviewed-on: https://code.wireshark.org/review/21710
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit 6bc71e4d0a205607496c1ecb7a0dc584fe4382e2)
+ Reviewed-on: https://code.wireshark.org/review/21717
+
+commit 7c5325f
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Fri May 19 14:44:14 2017 +0200
+
+ Qt: Check for no tvb in Show Packet Bytes
+
+ Bug: 13723
+ Change-Id: I145fe93fc05a9cfdc6c0fc949274a1e88dcf2f1e
+ Reviewed-on: https://code.wireshark.org/review/21709
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit 4424a8e86290265f6704ce0a67ebbd2bbd13e8f5)
+ Reviewed-on: https://code.wireshark.org/review/21716
+
+commit e91257d
+Author: Chris Wills <xenkrs@outlook.com>
+Date: Mon May 15 22:36:52 2017 -0700
+
+ Fixed array index using nss to match the definition
+
+ Bug: 13713
+ Change-Id: I7e96a6209fe5cd0ba11323f35e4408eb4ff7141a
+ Signed-off-by: Chris Wills <xenkrs@outlook.com>
+ Reviewed-on: https://code.wireshark.org/review/21677
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 924d1ecf6370c26bd31c08b922519a85669fa301)
+ Reviewed-on: https://code.wireshark.org/review/21680
+
+commit f2e208c
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Sun May 14 19:33:12 2017 +0200
+
+ SMB: Fix dissection of SMB_COM_TRANSACTION2_SECONDARY (0x33)
+
+ Issue reported by Alex
+ Bug: 13690
+ Change-Id: I6c0c01569be8474e1cbab0c8ca009c00394e1ffe
+ Reviewed-on: https://code.wireshark.org/review/21650
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ Petri-Dish: Anders Broman <a.broman58@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit c30bb2c75e3291a6a676ad74ab88934ca329106f)
+ Reviewed-on: https://code.wireshark.org/review/21656
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+
+commit 78bbcd0
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun May 14 08:25:09 2017 +0000
+
+ [Automatic update for 2017-05-14]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: Icf585929c1d877c3d4e107397a9373f98174db04
+ Reviewed-on: https://code.wireshark.org/review/21631
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 330bcb5
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Fri May 12 20:39:40 2017 +0200
+
+ BT L2CAP: avoid a division by 0
+
+ Bug: 13701
+ Change-Id: Ie433ecd932dcfc40fa6d3fdc3fa00139c64584a2
+ Reviewed-on: https://code.wireshark.org/review/21618
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit d566531ae5874bfd63c2755cba95cd63b7a4a189)
+ Reviewed-on: https://code.wireshark.org/review/21621
+
+commit f6408d6
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Fri May 5 11:46:07 2017 +0200
+
+ dns: improve loop detection in label decompression
+
+ Previously the number of allowed pointers within a message is equal to
+ the data in a tvb (16575 in one example). This is still expensive, so
+ implement an alternative detection mechanism that looks for a direct
+ self-loop and limits the total pointers to about 256.
+
+ Bug: 13633
+ Change-Id: I803873e24ab170c7ef0b881d3bdc9dfd4014de97
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
+ Reviewed-on: https://code.wireshark.org/review/21507
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit 129bdb5a164a6386c35ff387e9d8f0d3d6a12dbf)
+ Reviewed-on: https://code.wireshark.org/review/21596
+
+commit 35afffb
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun May 7 08:42:03 2017 -0700
+
+ [Automatic update for 2017-05-07]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: I82d46a8f82652b7c2fddb1189d763316088fe7f5
+ Reviewed-on: https://code.wireshark.org/review/21548
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 40b2d47
+Author: Michael Mann <mmann78@netscape.net>
+Date: Fri May 5 16:37:35 2017 -0400
+
+ packet-ipv6.c: dissect_routing6_rpl must have IPv6 addresses.
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
+ Bug: 13675
+ Change-Id: Icadf8a57a25bbf9abaa9685f9e9c7a803204b7e5
+ Reviewed-on: https://code.wireshark.org/review/21527
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 0e53c857e5ecc0032941b2e8a048989099fb0043)
+ Reviewed-on: https://code.wireshark.org/review/21532
+
+commit cb1b649
+Author: Michael Mann <mmann78@netscape.net>
+Date: Fri May 5 17:23:59 2017 -0400
+
+ packet-dcm.c: Fix infinite loop
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
+ Bug: 13685
+ Change-Id: Ic70cf8185beeb4cfa9417c287cf963e1c56bf86c
+ Reviewed-on: https://code.wireshark.org/review/21529
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 538abdfbc2225e8c39de99811fb9cbef53b0911b)
+ Reviewed-on: https://code.wireshark.org/review/21534
+
+commit 96c6623
+Author: Jaap Keuter <jaap.keuter@xs4all.nl>
+Date: Thu May 4 14:21:27 2017 +0200
+
+ Qt: Inhibit Disable Protocol when applicable
+
+ The packet details context menu allows you, through the Protocol
+ Preferences sub menu to manipulate (disable) the protocol dissection
+ through the Disable <protocol>... option. This opens up the appropriate
+ dialog and select the applicable protocol.
+ This fails for protocols which have their can_toggle flag reset (e.g.
+ the frame protocol). The dialog opens, but the protocol can't be found,
+ hence the top item is selected.
+
+ Instead disable the menu option for protocols which can't have their
+ enabled state toggled.
+
+ Change-Id: Ifa83f656a8ab747f379d3ca0114520e5efed4b67
+ Reviewed-on: https://code.wireshark.org/review/21494
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 8e52cfb891aa5de7b20f5dbd8471609e6c6ca40d)
+ Reviewed-on: https://code.wireshark.org/review/21503
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+
+commit 5673298
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu May 4 18:45:55 2017 +0200
+
+ bootp: fix potential buffer overflow (read)
+
+ The Vendor class Identifier is a string (used with strncmp). Be sure to
+ obtain a null-terminated string.
+
+ Bug: 13628
+ Change-Id: Ic6457da171fbfa1bd18366d965d22e942fb080d6
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
+ Bug: 13609
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
+ Reviewed-on: https://code.wireshark.org/review/21498
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ (cherry picked from commit 508bec78a39f0c7a2a54986b7616e4f615d6f170)
+ Reviewed-on: https://code.wireshark.org/review/21500
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit 9902d39
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Wed May 3 14:23:54 2017 -0700
+
+ Put back the null terminator in the list of handles.
+
+ The code to scan the list has always required a null terminator, but
+ change 96f517647a8f8b22c66eacf6e3d8bea9d8b8c68f got rid of the null
+ terminator.
+
+ Change-Id: I13c1553114e08e8617adaf8874ffb5e7c7c4b2d3
+ Reviewed-on: https://code.wireshark.org/review/21477
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 81292f3ac786578f0cadee55f16f6dfb8315b705)
+ Reviewed-on: https://code.wireshark.org/review/21478
+
+commit d8d7690
+Author: Michael Mann <mmann78@netscape.net>
+Date: Sat Apr 29 10:30:23 2017 -0400
+
+ packet-bzr.c: Prevent infinite loop
+
+ Bug: 13599
+ Change-Id: If85588099d7c6635865614f8778a903a5e971789
+ Reviewed-on: https://code.wireshark.org/review/21410
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit afb4de370a4c54e08e9367b55ae142414efc6e8f)
+ Reviewed-on: https://code.wireshark.org/review/21459
+
+commit bbae996
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Apr 30 08:37:34 2017 -0700
+
+ [Automatic update for 2017-04-30]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: I1d4bfe0a64c9ecc5e54f49f4144994520308cae6
+ Reviewed-on: https://code.wireshark.org/review/21428
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 7245279
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Apr 28 20:00:14 2017 -0700
+
+ Don't add /usr/X11/lib/pkgconfig if we're not using GTK+.
+
+ Qt for macOS doesn't use X11, so you don't need X11.
+
+ Change-Id: Ibc09a2d802f21b5be38baf735d2f6d582d6bf41f
+ Reviewed-on: https://code.wireshark.org/review/21401
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 5bda98586b4f81c14a5f3b8feacd10392dc0d078)
+ Reviewed-on: https://code.wireshark.org/review/21402
+
+commit 6e652aa
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Apr 28 19:55:44 2017 -0700
+
+ Get rid of a message that should no longer apply.
+
+ The version of pkg-config downloaded and built by macosx-setup.sh
+ defaults to looking in, among other places, /usr/local/lib/pkgconfig, so
+ you don't need to add that to PKG_CONFIG_PATH on macOS; Wireshark for
+ macOS no longer uses X11, so you don't need to add
+ /usr/X11/lib/pkgconfig to PKG_CONFIG_PATH on macOS.
+
+ Change-Id: I84fd6848b72010aafd7859c4e9c0a4362113c890
+ Reviewed-on: https://code.wireshark.org/review/21398
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 57b17187d5eda5dd481d1bf5c5e026866fc38e91)
+ Reviewed-on: https://code.wireshark.org/review/21399
+
+commit 3ce1ba9
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu Apr 27 09:15:01 2017 -0400
+
+ [OpenSafety] Bugfix invalid length calculation.
+
+ Length calculation leads to -1, which will result in a large malloc
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
+ Bug: 13649
+ Change-Id: Iccb78b8c8ec9ca8e8f97bc12d0d8f41526d1f791
+ Reviewed-on: https://code.wireshark.org/review/21367
+ Reviewed-by: Roland Knall <rknall@gmail.com>
+ Petri-Dish: Roland Knall <rknall@gmail.com>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit f6431695049116176361ce4691dfd3c77ab19858)
+ Reviewed-on: https://code.wireshark.org/review/21375
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+
+commit 5debcf5
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu Apr 27 09:28:25 2017 -0400
+
+ packet-rgmp.c: Ensure pinfo->dst is a valid IPv4 address
+
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
+ Bug: 13646
+ Change-Id: I2174e79dd2a9679f099c87c55c33984aca891d22
+ Reviewed-on: https://code.wireshark.org/review/21368
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 3f7f131ef372ec3a22f6363ab89dcdc0fba2b377)
+ Reviewed-on: https://code.wireshark.org/review/21385
+
+commit 5f6714e
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu Apr 27 09:50:34 2017 -0400
+
+ packet-sigcomp.c: Prevent large shift
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1232
+ Bug: 13641
+ Change-Id: I6e53d07dd03a5b637ca27884fad32ba5f7a85d0e
+ Reviewed-on: https://code.wireshark.org/review/21369
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit a1152a2a1f486e07e861afcc56ab0f16bb9c7a83)
+ Reviewed-on: https://code.wireshark.org/review/21373
+
+commit 20c7fe8
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu Apr 27 09:58:14 2017 -0400
+
+ packet-netsync.c: Prevent large shift
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1221
+ Bug: 13639
+ Change-Id: I0b67a270460473917f2481f79f404e4599727508
+ Reviewed-on: https://code.wireshark.org/review/21370
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 92903583f8373af782efe7ae64352ec1e426e35a)
+ Reviewed-on: https://code.wireshark.org/review/21371
+
+commit 9684ce8
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Tue Apr 25 22:01:21 2017 +0200
+
+ ISUP: restore number indicators2 display like what was done in master-1.12
+
+ proto_tree_add_bitmask_list() should avoided as there is an interpreted field.
+
+ Bug: 13588
+ Change-Id: Iec6bf9bb4002123b6913fbee6287472aaf9bc00b
+ Reviewed-on: https://code.wireshark.org/review/21340
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 821a3466c68ed509d8f71e34a62a2227823b1e55)
+ Reviewed-on: https://code.wireshark.org/review/21352
+
+commit d750edf
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Tue Apr 25 12:13:01 2017 +0200
+
+ ieee80211: fix stack-use-after-return
+
+ Bug: 13662
+ Change-Id: I26c53ecc78005b26908d74877814be22924848bc
+ Fixes: v1.11.3-rc1-2029-g4b8b83407a ("Support for IEEE 802.11ad")
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1268
+ Reviewed-on: https://code.wireshark.org/review/21333
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit bfd1461ec81311f31e9fc0f3f298ae779911c7f4)
+ Reviewed-on: https://code.wireshark.org/review/21337
+
+commit 1396b29
+Author: Stig Bjørlykke <stig@bjorlykke.org>
+Date: Tue Apr 25 08:18:05 2017 +0200
+
+ Qt: Make text in SimpleDialog selectable by mouse
+
+ This makes it easier to copy error messages.
+
+ Change-Id: I39284d9b2d716336c6fc4b211e5346abcebf0aee
+ Reviewed-on: https://code.wireshark.org/review/21326
+ Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Stig Bjørlykke <stig@bjorlykke.org>
+ (cherry picked from commit f9f2b84e658b8ce64553f9b9df3a37acaa2ec916)
+ Reviewed-on: https://code.wireshark.org/review/21330
+
+commit 4fe7484
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Mon Apr 24 21:16:37 2017 +0200
+
+ GSM SMS: fix display of reassembled 8 bits SMS
+
+ Change-Id: I0052fb1f311f18180fbc7c6b8bd2fbf23215ad67
+ Reviewed-on: https://code.wireshark.org/review/21319
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit cb089dd2ff20cd7cc165de303de075bcb6be3afc)
+ Reviewed-on: https://code.wireshark.org/review/21322
+
+commit 8525318
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Sat Apr 22 18:46:23 2017 +0200
+
+ slsk: fix infinite loop
+
+ If check_slsk_format reports that the buffer does not contain the
+ expected data, do not try to find more items (break out of the loop).
+
+ In one case, an infinite loop would occur because the index variable was
+ not incremented when the check fails. In all other cases, it would
+ perform up to 2^32 calls to check_slsk_format per loop (with the same
+ offset parameter, so no exception is triggered).
+
+ Change-Id: I4b7fa10a36fee2551fa46831bcecd6bcd9f342d1
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
+ Bug: 13631
+ Reviewed-on: https://code.wireshark.org/review/21284
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 7eab596c0824e6fa20aad6932bcd2fdb94b86edf)
+ [ Conflicts: manually resolved, skipped removal of "i = 0" from lines
+ where "j = tvb_get_letohl(...)" occurs ]
+ Reviewed-on: https://code.wireshark.org/review/21296
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 8103049
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Apr 23 08:37:33 2017 -0700
+
+ [Automatic update for 2017-04-23]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: Ib6303f93a110553ac6432de004f78a19cbcce466
+ Reviewed-on: https://code.wireshark.org/review/21299
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit 7fe55f9
+Author: Björn Ruytenberg <bjorn@bjornweb.nl>
+Date: Sat Apr 22 23:33:57 2017 +0200
+
+ DOF: Fix buffer overflow (read)
+
+ Perform sanity check on buffer length parsed from data. Check buffer
+ size before reading value.
+
+ Change-Id: I8beaf8860b39426d79867b0dd2221e57e32da8e0
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
+ Bug: 13608
+ Reviewed-on: https://code.wireshark.org/review/21287
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 6fdf8eb5a92d51617203be1a712c15585b156497)
+ Reviewed-on: https://code.wireshark.org/review/21290
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+
+commit 6b82c80
+Author: Michael Mann <mmann78@netscape.net>
+Date: Wed Apr 19 21:43:49 2017 -0400
+
+ packet-quakeworld.c: Fix potential out of bounds error.
+
+ Overflow can occur while writing to a buffer.
+
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1179
+ Bug: 13624
+ Change-Id: I7511c43ed67f81d246e3eb66e092353e2ab4924c
+ Reviewed-on: https://code.wireshark.org/review/21235
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 22f05d620f428c0769227f0173876c95fb9aead4)
+ Reviewed-on: https://code.wireshark.org/review/21285
+
+commit 278e52f
+Author: Jaap Keuter <jaap.keuter@xs4all.nl>
+Date: Sat Apr 22 13:17:37 2017 +0200
+
+ ROS: Harden ROS dissection
+
+ Make sure that on a OID search an actual OID is available to search for.
+
+ # Conflicts:
+ # epan/dissectors/asn1/ros/packet-ros-template.c
+ # epan/dissectors/packet-ros.c
+
+ Bug: 13637
+ Change-Id: I36f84cce5506f003d2a30a17f8671d5e22070612
+ Reviewed-on: https://code.wireshark.org/review/21280
+ Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl>
+ Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Reviewed-on: https://code.wireshark.org/review/21283
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+
+commit bf3ad38
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Apr 21 03:10:21 2017 -0700
+
+ Code in epan/dissectors may require GeoIP.h, so include LIBGEOIP_FLAGS.
+
+ Change-Id: I31bd53c49906db24b64fa3f1e3078b0658db3158
+ Reviewed-on: https://code.wireshark.org/review/21269
+ Petri-Dish: Guy Harris <guy@alum.mit.edu>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 2c52d954d5713be1b809c3b668b0353d2b355c16)
+ Reviewed-on: https://code.wireshark.org/review/21275
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+
+commit 35e89a7
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Apr 20 23:15:38 2017 +0200
+
+ Fixes for sfloat_ieee_11073_val_to_repr() function
+
+ - when having a special value, leave function once buffer is written
+ - give the right buffer length to g_snprintf() function
+
+ Bug: 13590
+ Change-Id: Iecf1456686b6e92a7cfcf8ed6d8619541ad50ace
+ Reviewed-on: https://code.wireshark.org/review/21260
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit a967ca50746fff4035f166585a9172b082431ec5)
+ Reviewed-on: https://code.wireshark.org/review/21266
+
+commit b7cfcce
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu Apr 20 08:44:52 2017 -0400
+
+ dwarf.c: Fix potential too large shift
+
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1167
+ Bug: 13616
+
+ Change-Id: I43ab629ad8368bf672d1c079219d6b055c431e86
+ Reviewed-on: https://code.wireshark.org/review/21249
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 70b6e406e783eab172b4b9e90e9e7e624d7facb8)
+ Reviewed-on: https://code.wireshark.org/review/21263
+
+commit e717284
+Author: Michael Mann <mmann78@netscape.net>
+Date: Thu Apr 20 13:05:52 2017 -0400
+
+ sigcomp: Shift operand should be limited to 16 bits
+
+ # Conflicts:
+ # epan/dissectors/packet-sigcomp.c
+
+ Change-Id: I5a6fbcacf874962c361e68fef7402dc775aca658
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1154
+ Bug: 13610
+ Reviewed-on: https://code.wireshark.org/review/21250
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Reviewed-on: https://code.wireshark.org/review/21256
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+
+commit 407a79b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Thu Apr 20 11:46:45 2017 -0700
+
+ cf_open() pops up a dialog box on errors; its callers shouldn't do so.
+
+ Change-Id: I1c65854b5bde1c64d70cb17a13080829f0faa27b
+ Reviewed-on: https://code.wireshark.org/review/21253
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit d97ce76161f573beb88fff7eefe4e0f686a4f3a9)
+ Reviewed-on: https://code.wireshark.org/review/21254
+
+commit b7cf108
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Wed Apr 12 00:55:06 2017 +0200
+
+ Qt: Prevent moving other columns on drag and drop
+
+ This workaround prevents moving around other columns during drag and
+ drop and also transfers the sorting order to the new position.
+
+ Bug: 13183
+ Ping-Bug: 13540
+ Change-Id: I4609c63557bf3abf06ba417ac1b40cac22a82abc
+ Reviewed-on: https://code.wireshark.org/review/21022
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ (cherry picked from commit 691d803037f777ff1bed025a48a48aa92956967f)
+ Reviewed-on: https://code.wireshark.org/review/21247
+
+commit 66a8087
+Author: Michael Mann <mmann78@netscape.net>
+Date: Wed Apr 19 22:38:09 2017 -0400
+
+ packet-sigcomp.c: Fix potential negative shift
+
+ Bug: 13619
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1172
+ Change-Id: Ifa5ed88031425701f9cb14c80eb61311e0bba4aa
+ Reviewed-on: https://code.wireshark.org/review/21236
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 2ab4f63dea65de2e00fa488a35a86cfd494d5fca)
+ Reviewed-on: https://code.wireshark.org/review/21243
+
+commit 947b672
+Author: Michael Mann <mmann78@netscape.net>
+Date: Wed Apr 19 22:51:45 2017 -0400
+
+ packet-xot.c: Handle potentially large representation of packet sizes
+
+ Value on wire is 2^x, so represent the field that way.
+
+ Bug: 13618
+ Change-Id: Ida4a85e1f52b29b8b89fa835f78ef3fff2bde5c9
+ Reviewed-on: https://code.wireshark.org/review/21237
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Jaap Keuter <jaap.keuter@xs4all.nl>
+ (cherry picked from commit 3e755bb0c1b8ad9e466db1d02d76995ce1d39763)
+ Reviewed-on: https://code.wireshark.org/review/21241
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+
+commit 95b4545
+Author: Jaap Keuter <jaap.keuter@xs4all.nl>
+Date: Tue Apr 18 23:24:23 2017 +0200
+
+ RTCP: Handle large TMMBR value presentation
+
+ TMMBR can be _very_ large (131072*2^63, larger than 64 bit entities can
+ hold). Therefore don't try to calculate and present the bitrate as an
+ integer value, but as an expression.
+
+ Bug: 13611
+ Change-Id: Ieb8caae5d72d06f82c134eda63f99575218584c2
+ Reviewed-on: https://code.wireshark.org/review/21207
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 05140af874e9bd86160659dbc8541373d662e290)
+ Reviewed-on: https://code.wireshark.org/review/21212
+
+commit 4997c64
+Author: Xiaochuan Sun <linuxvxworks@gmail.com>
+Date: Mon Apr 17 19:39:15 2017 +0800
+
+ remove unnecessary guint64 cast in IO graph
+
+ Change-Id: I35d666a5a9fb5813706c312334f1552703c9475c
+ Reviewed-on: https://code.wireshark.org/review/21214
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit d13c6d9628e3964697559e3509d9c1f8ec30ed9e)
+ Reviewed-on: https://code.wireshark.org/review/21216
+
+commit 35c806f
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Tue Apr 18 16:28:52 2017 +0200
+
+ netflow: fix undefined shift
+
+ Treat any prefix length larger than 32 as 32 (effectively not masking
+ anything) and treat a zero-length prefix as the empty mask (matching
+ anything).
+
+ Change-Id: If96b03c2f76ff7624d50fefdf0b025ab373c07dc
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1152
+ Bug: 13607
+ Reviewed-on: https://code.wireshark.org/review/21189
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 870b3d2c0f46addafb6a7dab4278de48edc33535)
+ Reviewed-on: https://code.wireshark.org/review/21201
+
+commit ea9ad9e
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Tue Apr 18 16:01:10 2017 +0200
+
+ ositp: fix undefined behavior from large shift
+
+ Display "2^105" instead of the expanded value.
+
+ Change-Id: I455625ab66cd86587ca35d09e1eba98ae1d87a94
+ Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1149
+ Bug: 13606
+ Reviewed-on: https://code.wireshark.org/review/21188
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Petri-Dish: Peter Wu <peter@lekensteyn.nl>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 5df6cc4b3da71f3d9564eab1ed25f4d3ad21a3ff)
+ Reviewed-on: https://code.wireshark.org/review/21196
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+
+commit a684e88
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Sun Apr 16 08:38:26 2017 -0700
+
+ [Automatic update for 2017-04-16]
+
+ Update manuf, services enterprise-numbers, translations, and other items.
+
+ Change-Id: I8044643c22134400713d63f622e7fb9e6612a138
+ Reviewed-on: https://code.wireshark.org/review/21143
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>
+
+commit d934481
+Author: Alexis La Goutte <alexis.lagoutte@gmail.com>
+Date: Wed Apr 12 14:15:00 2017 +0200
+
+ btatt: failed assertion 'hf->bitmask != 0' (btatt.glucose_measurement.type_and_sample_location.type)
+
+ Fixes: v1.99.9rc0-246-ga50a49e527 ("Bluetooth: ATT: Add some remaining attributes")
+
+ Bug: 13590
+ Change-Id: I8e92ec80ee9e93a3e507f86c8354f1909070b0b9
+ Reviewed-on: https://code.wireshark.org/review/21041
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Peter Wu <peter@lekensteyn.nl>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit f4f252d4c4b1d498c81d22686b160c7feccdc68d)
+ Reviewed-on: https://code.wireshark.org/review/21139
+
+commit fd9ec3f
+Author: Uli Heilmeier <uh@heilmeier.eu>
+Date: Fri Apr 14 14:46:11 2017 +0200
+
+ DICOM: Revert 3752a643ac5c85622822c88c69d83ce23828acb8
+
+ Revert commit 3752a643ac5c85622822c88c69d83ce23828acb8
+ to fix bug 13164 and bug 13570 introduced with this commit.
+
+ This reopens bug 13110.
+
+ Bug: 13164
+ Bug: 13570
+ Change-Id: Id237f08258ca100f675614a9cb36a32340944b3e
+ Reviewed-on: https://code.wireshark.org/review/21089
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit ce50000f14da32dd2ae50f5b5efa12333e29dfcc)
+ Reviewed-on: https://code.wireshark.org/review/21121
+
+commit e9ebe2b
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Apr 15 14:45:12 2017 -0700
+
+ Catch attempts to pass unregistered protocols to prefs routines.
+
+ That way, you don't end up with "(none)" being used as the filter name
+ and getting confusing error messages.
+
+ Change-Id: Ifc77d4434d82dabebe74118742938cfa5234791d
+ Reviewed-on: https://code.wireshark.org/review/21118
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit cbc2c84a27f3158784238cbc4b2076618b7dc6e4)
+ Reviewed-on: https://code.wireshark.org/review/21119
+
+commit 24b0ca4
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Sat Apr 15 12:37:34 2017 -0700
+
+ Squelch some compiler warnings.
+
+ Cast an ssize_t value to unsigned int before subtracting it from an
+ unsigned int. The value is already known to be >= 0 and <= the value
+ from which we're subtracting it, and that latter value is an unsigned
+ int, so it's guaranteed to fit into an unsigned int. (ssize_t can be
+ bigger than unsigned int.)
+
+ Change-Id: I5c4d3c7fa4bf241c9ea72661beca89bc30495a3b
+ Reviewed-on: https://code.wireshark.org/review/21114
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 237d23dc7355f066d772ba6ad184d5f99c25fa5a)
+ Reviewed-on: https://code.wireshark.org/review/21115
+
+commit df6b748
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Apr 14 18:28:25 2017 -0700
+
+ Make whitespace match what's checked into the SQLite repository.
+
+ They accepted some of our changes, but with no space between "struct
+ XXX" and "*. Whatever.
+
+ Change-Id: I6b29462dc8b04ebf0822f8512d82f5f8df575447
+ Reviewed-on: https://code.wireshark.org/review/21101
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 3bd767108391e6d3498241b20e86ca176dffc185)
+ Reviewed-on: https://code.wireshark.org/review/21102
+
+commit f899ee7
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Apr 14 17:44:04 2017 -0700
+
+ Fix parsing of packet ranges.
+
+ Replace the dash in a range with a '\0', so that the first value in the
+ range is properly terminated.
+
+ Change-Id: Ib2807c2534c1e99e643848ca0fc32f4b78025ce3
+ Reviewed-on: https://code.wireshark.org/review/21099
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit 0f3e20051c5be2d8164365763e63988a30aa24f4)
+ Reviewed-on: https://code.wireshark.org/review/21100
+
+commit 6461ed4
+Author: Guy Harris <guy@alum.mit.edu>
+Date: Fri Apr 14 12:34:18 2017 -0700
+
+ Give a better error message for invalid characters in preference module names.
+
+ And make the message for an invalid character in a preference name more
+ like it, by putting the offending name in quotes.
+
+ Change-Id: I40db8b87eae5e46a1d49213a9a45861b6b3565af
+ Reviewed-on: https://code.wireshark.org/review/21092
+ Reviewed-by: Guy Harris <guy@alum.mit.edu>
+ (cherry picked from commit c398858205724434bfcbec0ffed1f4223c2c85d1)
+ Reviewed-on: https://code.wireshark.org/review/21093
+
+commit 382fdc6
+Author: Pascal Quantin <pascal.quantin@gmail.com>
+Date: Thu Apr 13 13:17:41 2017 +0200
+
+ LTE RRC: do not display twice RRCConnectionReestablishmentReject in info column
+
+ Bug: 13595
+ Change-Id: I5d1537afea7f5a2dddd5e11a06c451ec00913d12
+ Reviewed-on: https://code.wireshark.org/review/21073
+ Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
+ (cherry picked from commit 4e56c063b462837202d6c37adbdc4c0726a25024)
+ Reviewed-on: https://code.wireshark.org/review/21074
+
+commit 8569f0b
+Author: Michael Mann <mmann78@netscape.net>
+Date: Wed Apr 12 22:40:32 2017 -0400
+
+ Bugfix bad checksum of ICMP extension header.
+
+ Use offset in tvb, not 0 for computation.
+ Also add check for checksum = 0, which means checksum isn't present.
+
+ # Conflicts:
+ # epan/dissectors/packet-icmp.c
+
+ Bug: 13586
+ Change-Id: I18812894104c35e50ecb99aa8eca6b030c78c486
+ Reviewed-on: https://code.wireshark.org/review/21072
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+
+commit 4ca3155
+Author: Michael Mann <mmann78@netscape.net>
+Date: Mon Apr 10 23:26:07 2017 -0400
+
+ packet-icmp.c: Remove tree check that prevents expert info
+
+ proto_tree_add_checksum uses expert info and shouldn't be
+ "NULL tree protected"
+
+ Change-Id: If8a367c2be69252e9c6613329b7f78ad7e1e34eb
+ Ping-Bug: 13586
+ Reviewed-on: https://code.wireshark.org/review/21012
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ Petri-Dish: Michael Mann <mmann78@netscape.net>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Anders Broman <a.broman58@gmail.com>
+ (cherry picked from commit 6b30fe1ce5014ec332cf8c2f483f9f1c519e0167)
+ Reviewed-on: https://code.wireshark.org/review/21071
+
+commit d05983e
+Author: Ahmad Fatoum <ahmad@a3f.at>
+Date: Wed Apr 12 19:36:27 2017 +0200
+
+ packet-epl.c: Fix bigger-than-actual offset being reported
+
+ dissect_epl_asnd_nmtdna returns the offset + 27,
+ adding that to the original offset isn't correct,
+ unless the offset was 0 to begin with, which isn't the case.
+
+ Change-Id: Id0d5043b23a83aef8d07a6f6ee3b70486d913e9f
+ Reviewed-on: https://code.wireshark.org/review/21056
+ Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com>
+ Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
+ Reviewed-by: Michael Mann <mmann78@netscape.net>
+ (cherry picked from commit 6c096f31ac6bbe2f0b7e0fd43dddb5419a8b2a3d)
+ Reviewed-on: https://code.wireshark.org/review/21069
+
+commit 87113a8
+Author: Gerald Combs <gerald@wireshark.org>
+Date: Wed Apr 12 15:10:36 2017 -0700
+
+ 2.2.6 → 2.2.7.
+
+ Change-Id: I844df8bd6b9d895ae04c99dce9b4656e7c395c11
+ Reviewed-on: https://code.wireshark.org/review/21065
+ Reviewed-by: Gerald Combs <gerald@wireshark.org>