aboutsummaryrefslogtreecommitdiffstats
path: root/NEWS
diff options
context:
space:
mode:
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS202
1 files changed, 110 insertions, 92 deletions
diff --git a/NEWS b/NEWS
index e969849fe6..f83c4f36c9 100644
--- a/NEWS
+++ b/NEWS
@@ -15,91 +15,99 @@ Wireshark 3.0.1 Release Notes
The following vulnerabilities have been fixed:
• wnpa-sec-2019-09[1] NetScaler file parser crash. Bug 15497[2].
+ CVE-2019-10895[3].
- • wnpa-sec-2019-10[3] SRVLOC dissector crash. Bug 15546[4].
+ • wnpa-sec-2019-10[4] SRVLOC dissector crash. Bug 15546[5].
+ CVE-2019-10899[6].
- • wnpa-sec-2019-11[5] IEEE 802.11 dissector infinite loop. Bug
- 15553[6].
+ • wnpa-sec-2019-11[7] IEEE 802.11 dissector infinite loop. Bug
+ 15553[8]. CVE-2019-10897[9].
- • wnpa-sec-2019-12[7] GSUP dissector infinite loop. Bug 15585[8].
+ • wnpa-sec-2019-12[10] GSUP dissector infinite loop. Bug 15585[11].
+ CVE-2019-10898[12].
- • wnpa-sec-2019-13[9] Rbm dissector infinite loop. Bug 15612[10].
+ • wnpa-sec-2019-13[13] Rbm dissector infinite loop. Bug 15612[14].
+ CVE-2019-10900[15].
- • wnpa-sec-2019-14[11] GSS-API dissector crash. Bug 15613[12].
+ • wnpa-sec-2019-14[16] GSS-API dissector crash. Bug 15613[17].
+ CVE-2019-10894[18].
- • wnpa-sec-2019-15[13] DOF dissector crash. Bug 15617[14].
+ • wnpa-sec-2019-15[19] DOF dissector crash. Bug 15617[20].
+ CVE-2019-10896[21].
- • wnpa-sec-2019-16[15] TSDNS dissector crash. Bug 15619[16].
+ • wnpa-sec-2019-16[22] TSDNS dissector crash. Bug 15619[23].
+ CVE-2019-10902[24].
- • wnpa-sec-2019-17[17] LDSS dissector crash. Bug 15620[18].
+ • wnpa-sec-2019-17[25] LDSS dissector crash. Bug 15620[26].
+ CVE-2019-10901[27].
- • wnpa-sec-2019-18[19] DCERPC SPOOLSS dissector crash. Bug
- 15568[20].
+ • wnpa-sec-2019-18[28] DCERPC SPOOLSS dissector crash. Bug
+ 15568[29]. CVE-2019-10903[30].
The following bugs have been fixed:
• [oss-fuzz] UBSAN: shift exponent 34 is too large for 32-bit type
'guint32' (aka 'unsigned int') in packet-ieee80211.c:15534:49.
- Bug 14770[21].
+ Bug 14770[31].
• [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type
- 'int' in packet-couchbase.c:1674:37. Bug 15439[22].
+ 'int' in packet-couchbase.c:1674:37. Bug 15439[32].
- • Duplicated TCP SEQ field in ICMP packets. Bug 15533[23].
+ • Duplicated TCP SEQ field in ICMP packets. Bug 15533[33].
• Wrong length in dhcpv6 NTP Server suboption results in "Malformed
- Packet" and breaks further dissection. Bug 15542[24].
+ Packet" and breaks further dissection. Bug 15542[34].
• Wireshark’s speaker-to-MaxMind is burning up the CPU. Bug
- 15545[25].
+ 15545[35].
• GSM-A-RR variable bitmap decoding may report ARFCNs > 1023. Bug
- 15549[26].
+ 15549[36].
• Import hexdump dummy Ethernet header generation ignores direction
- indication. Bug 15561[27].
+ indication. Bug 15561[37].
- • %T not supported for timestamps. Bug 15565[28].
+ • %T not supported for timestamps. Bug 15565[38].
- • LWM2M: resource with \r\n badly shown. Bug 15572[29].
+ • LWM2M: resource with \r\n badly shown. Bug 15572[39].
• When selecting BSSAP in 'Decode As' for a SCCP payload, it uses
- BSSAP+ which is not the same protocol. Bug 15578[30].
+ BSSAP+ which is not the same protocol. Bug 15578[40].
• Possible buffer overflow in function ssl_md_final for crafted SSL
- 3.0 sessions. Bug 15599[31].
+ 3.0 sessions. Bug 15599[41].
- • Windows console log output delay. Bug 15605[32].
+ • Windows console log output delay. Bug 15605[42].
• Syslog dissector processes the UTF-8 BOM incorrectly. Bug
- 15607[33].
+ 15607[43].
• NFS/NLM: Wrong lock byte range in the "Info" column. Bug
- 15608[34].
+ 15608[44].
- • randpkt -r causes segfault when count > 1. Bug 15627[35].
+ • randpkt -r causes segfault when count > 1. Bug 15627[45].
• Tshark export to ElasticSearch (-Tek) fails with Bad json_dumper
- state: illegal transition. Bug 15628[36].
+ state: illegal transition. Bug 15628[46].
• Packets with metadata but no data get the Protocol Info column
- overwritten. Bug 15630[37].
+ overwritten. Bug 15630[47].
• BGP MP_REACH_NLRI AFI: Layer-2 VPN, SAFI: EVPN - Label stack not
- decoded. Bug 15631[38].
+ decoded. Bug 15631[48].
- • Buildbot crash output: fuzz-2019-03-23-1789.pcap. Bug 15634[39].
+ • Buildbot crash output: fuzz-2019-03-23-1789.pcap. Bug 15634[49].
- • Typo: broli → brotli. Bug 15647[40].
+ • Typo: broli → brotli. Bug 15647[50].
• Wrong dissection of GTPv2 MM Context Used NAS integrity
- protection algorithm. Bug 15648[41].
+ protection algorithm. Bug 15648[51].
• Windows CHM (help file) title displays quoted HTML characters.
- Bug 15656[42].
+ Bug 15656[52].
• Unable to load 3rd party plugins not signed by Wireshark’s
- codesigning certificate. Bug 15667[43].
+ codesigning certificate. Bug 15667[53].
New and Updated Features
@@ -127,14 +135,14 @@ Wireshark 3.0.1 Release Notes
Getting Wireshark
Wireshark source code and installation packages are available from
- https://www.wireshark.org/download.html[44].
+ https://www.wireshark.org/download.html[54].
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
- be found on the download page[45] on the Wireshark web site.
+ be found on the download page[55] on the Wireshark web site.
File Locations
@@ -146,73 +154,83 @@ Wireshark 3.0.1 Release Notes
Getting Help
The User’s Guide, manual pages and various other documentation can be
- found at https://www.wireshark.org/docs/[46]
+ found at https://www.wireshark.org/docs/[56]
- Community support is available on Wireshark’s Q&A site[47] and on the
+ Community support is available on Wireshark’s Q&A site[57] and on the
wireshark-users mailing list. Subscription information and archives
- for all of Wireshark’s mailing lists can be found on the web site[48].
+ for all of Wireshark’s mailing lists can be found on the web site[58].
- Bugs and feature requests can be reported on the bug tracker[49].
+ Bugs and feature requests can be reported on the bug tracker[59].
Official Wireshark training and certification are available from
- Wireshark University[50].
+ Wireshark University[60].
Frequently Asked Questions
- A complete FAQ is available on the Wireshark web site[51].
+ A complete FAQ is available on the Wireshark web site[61].
- Last updated 2019-04-07 08:35:16 UTC
+ Last updated 2019-04-08 17:06:38 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2019-09
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
- 3. https://www.wireshark.org/security/wnpa-sec-2019-10
- 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546
- 5. https://www.wireshark.org/security/wnpa-sec-2019-11
- 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15553
- 7. https://www.wireshark.org/security/wnpa-sec-2019-12
- 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585
- 9. https://www.wireshark.org/security/wnpa-sec-2019-13
- 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612
- 11. https://www.wireshark.org/security/wnpa-sec-2019-14
- 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613
- 13. https://www.wireshark.org/security/wnpa-sec-2019-15
- 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617
- 15. https://www.wireshark.org/security/wnpa-sec-2019-16
- 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15619
- 17. https://www.wireshark.org/security/wnpa-sec-2019-17
- 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620
- 19. https://www.wireshark.org/security/wnpa-sec-2019-18
- 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
- 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14770
- 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15439
- 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15533
- 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15542
- 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15545
- 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15549
- 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15561
- 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15565
- 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15572
- 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15578
- 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15599
- 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15605
- 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15607
- 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15608
- 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15627
- 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15628
- 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15630
- 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15631
- 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15634
- 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15647
- 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15648
- 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15656
- 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15667
- 44. https://www.wireshark.org/download.html
- 45. https://www.wireshark.org/download.html#thirdparty
- 46. https://www.wireshark.org/docs/
- 47. https://ask.wireshark.org/
- 48. https://www.wireshark.org/lists/
- 49. https://bugs.wireshark.org/
- 50. http://www.wiresharktraining.com/
- 51. https://www.wireshark.org/faq.html
+ 3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10895
+ 4. https://www.wireshark.org/security/wnpa-sec-2019-10
+ 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546
+ 6. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899
+ 7. https://www.wireshark.org/security/wnpa-sec-2019-11
+ 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15553
+ 9. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10897
+ 10. https://www.wireshark.org/security/wnpa-sec-2019-12
+ 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585
+ 12. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10898
+ 13. https://www.wireshark.org/security/wnpa-sec-2019-13
+ 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612
+ 15. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10900
+ 16. https://www.wireshark.org/security/wnpa-sec-2019-14
+ 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613
+ 18. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894
+ 19. https://www.wireshark.org/security/wnpa-sec-2019-15
+ 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617
+ 21. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896
+ 22. https://www.wireshark.org/security/wnpa-sec-2019-16
+ 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15619
+ 24. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10902
+ 25. https://www.wireshark.org/security/wnpa-sec-2019-17
+ 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620
+ 27. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901
+ 28. https://www.wireshark.org/security/wnpa-sec-2019-18
+ 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
+ 30. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10903
+ 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14770
+ 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15439
+ 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15533
+ 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15542
+ 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15545
+ 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15549
+ 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15561
+ 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15565
+ 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15572
+ 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15578
+ 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15599
+ 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15605
+ 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15607
+ 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15608
+ 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15627
+ 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15628
+ 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15630
+ 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15631
+ 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15634
+ 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15647
+ 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15648
+ 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15656
+ 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15667
+ 54. https://www.wireshark.org/download.html
+ 55. https://www.wireshark.org/download.html#thirdparty
+ 56. https://www.wireshark.org/docs/
+ 57. https://ask.wireshark.org/
+ 58. https://www.wireshark.org/lists/
+ 59. https://bugs.wireshark.org/
+ 60. http://www.wiresharktraining.com/
+ 61. https://www.wireshark.org/faq.html