diff options
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 202 |
1 files changed, 110 insertions, 92 deletions
@@ -15,91 +15,99 @@ Wireshark 3.0.1 Release Notes The following vulnerabilities have been fixed: • wnpa-sec-2019-09[1] NetScaler file parser crash. Bug 15497[2]. + CVE-2019-10895[3]. - • wnpa-sec-2019-10[3] SRVLOC dissector crash. Bug 15546[4]. + • wnpa-sec-2019-10[4] SRVLOC dissector crash. Bug 15546[5]. + CVE-2019-10899[6]. - • wnpa-sec-2019-11[5] IEEE 802.11 dissector infinite loop. Bug - 15553[6]. + • wnpa-sec-2019-11[7] IEEE 802.11 dissector infinite loop. Bug + 15553[8]. CVE-2019-10897[9]. - • wnpa-sec-2019-12[7] GSUP dissector infinite loop. Bug 15585[8]. + • wnpa-sec-2019-12[10] GSUP dissector infinite loop. Bug 15585[11]. + CVE-2019-10898[12]. - • wnpa-sec-2019-13[9] Rbm dissector infinite loop. Bug 15612[10]. + • wnpa-sec-2019-13[13] Rbm dissector infinite loop. Bug 15612[14]. + CVE-2019-10900[15]. - • wnpa-sec-2019-14[11] GSS-API dissector crash. Bug 15613[12]. + • wnpa-sec-2019-14[16] GSS-API dissector crash. Bug 15613[17]. + CVE-2019-10894[18]. - • wnpa-sec-2019-15[13] DOF dissector crash. Bug 15617[14]. + • wnpa-sec-2019-15[19] DOF dissector crash. Bug 15617[20]. + CVE-2019-10896[21]. - • wnpa-sec-2019-16[15] TSDNS dissector crash. Bug 15619[16]. + • wnpa-sec-2019-16[22] TSDNS dissector crash. Bug 15619[23]. + CVE-2019-10902[24]. - • wnpa-sec-2019-17[17] LDSS dissector crash. Bug 15620[18]. + • wnpa-sec-2019-17[25] LDSS dissector crash. Bug 15620[26]. + CVE-2019-10901[27]. - • wnpa-sec-2019-18[19] DCERPC SPOOLSS dissector crash. Bug - 15568[20]. + • wnpa-sec-2019-18[28] DCERPC SPOOLSS dissector crash. Bug + 15568[29]. CVE-2019-10903[30]. The following bugs have been fixed: • [oss-fuzz] UBSAN: shift exponent 34 is too large for 32-bit type 'guint32' (aka 'unsigned int') in packet-ieee80211.c:15534:49. - Bug 14770[21]. + Bug 14770[31]. • [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type - 'int' in packet-couchbase.c:1674:37. Bug 15439[22]. + 'int' in packet-couchbase.c:1674:37. Bug 15439[32]. - • Duplicated TCP SEQ field in ICMP packets. Bug 15533[23]. + • Duplicated TCP SEQ field in ICMP packets. Bug 15533[33]. • Wrong length in dhcpv6 NTP Server suboption results in "Malformed - Packet" and breaks further dissection. Bug 15542[24]. + Packet" and breaks further dissection. Bug 15542[34]. • Wireshark’s speaker-to-MaxMind is burning up the CPU. Bug - 15545[25]. + 15545[35]. • GSM-A-RR variable bitmap decoding may report ARFCNs > 1023. Bug - 15549[26]. + 15549[36]. • Import hexdump dummy Ethernet header generation ignores direction - indication. Bug 15561[27]. + indication. Bug 15561[37]. - • %T not supported for timestamps. Bug 15565[28]. + • %T not supported for timestamps. Bug 15565[38]. - • LWM2M: resource with \r\n badly shown. Bug 15572[29]. + • LWM2M: resource with \r\n badly shown. Bug 15572[39]. • When selecting BSSAP in 'Decode As' for a SCCP payload, it uses - BSSAP+ which is not the same protocol. Bug 15578[30]. + BSSAP+ which is not the same protocol. Bug 15578[40]. • Possible buffer overflow in function ssl_md_final for crafted SSL - 3.0 sessions. Bug 15599[31]. + 3.0 sessions. Bug 15599[41]. - • Windows console log output delay. Bug 15605[32]. + • Windows console log output delay. Bug 15605[42]. • Syslog dissector processes the UTF-8 BOM incorrectly. Bug - 15607[33]. + 15607[43]. • NFS/NLM: Wrong lock byte range in the "Info" column. Bug - 15608[34]. + 15608[44]. - • randpkt -r causes segfault when count > 1. Bug 15627[35]. + • randpkt -r causes segfault when count > 1. Bug 15627[45]. • Tshark export to ElasticSearch (-Tek) fails with Bad json_dumper - state: illegal transition. Bug 15628[36]. + state: illegal transition. Bug 15628[46]. • Packets with metadata but no data get the Protocol Info column - overwritten. Bug 15630[37]. + overwritten. Bug 15630[47]. • BGP MP_REACH_NLRI AFI: Layer-2 VPN, SAFI: EVPN - Label stack not - decoded. Bug 15631[38]. + decoded. Bug 15631[48]. - • Buildbot crash output: fuzz-2019-03-23-1789.pcap. Bug 15634[39]. + • Buildbot crash output: fuzz-2019-03-23-1789.pcap. Bug 15634[49]. - • Typo: broli → brotli. Bug 15647[40]. + • Typo: broli → brotli. Bug 15647[50]. • Wrong dissection of GTPv2 MM Context Used NAS integrity - protection algorithm. Bug 15648[41]. + protection algorithm. Bug 15648[51]. • Windows CHM (help file) title displays quoted HTML characters. - Bug 15656[42]. + Bug 15656[52]. • Unable to load 3rd party plugins not signed by Wireshark’s - codesigning certificate. Bug 15667[43]. + codesigning certificate. Bug 15667[53]. New and Updated Features @@ -127,14 +135,14 @@ Wireshark 3.0.1 Release Notes Getting Wireshark Wireshark source code and installation packages are available from - https://www.wireshark.org/download.html[44]. + https://www.wireshark.org/download.html[54]. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can - be found on the download page[45] on the Wireshark web site. + be found on the download page[55] on the Wireshark web site. File Locations @@ -146,73 +154,83 @@ Wireshark 3.0.1 Release Notes Getting Help The User’s Guide, manual pages and various other documentation can be - found at https://www.wireshark.org/docs/[46] + found at https://www.wireshark.org/docs/[56] - Community support is available on Wireshark’s Q&A site[47] and on the + Community support is available on Wireshark’s Q&A site[57] and on the wireshark-users mailing list. Subscription information and archives - for all of Wireshark’s mailing lists can be found on the web site[48]. + for all of Wireshark’s mailing lists can be found on the web site[58]. - Bugs and feature requests can be reported on the bug tracker[49]. + Bugs and feature requests can be reported on the bug tracker[59]. Official Wireshark training and certification are available from - Wireshark University[50]. + Wireshark University[60]. Frequently Asked Questions - A complete FAQ is available on the Wireshark web site[51]. + A complete FAQ is available on the Wireshark web site[61]. - Last updated 2019-04-07 08:35:16 UTC + Last updated 2019-04-08 17:06:38 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2019-09 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497 - 3. https://www.wireshark.org/security/wnpa-sec-2019-10 - 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546 - 5. https://www.wireshark.org/security/wnpa-sec-2019-11 - 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15553 - 7. https://www.wireshark.org/security/wnpa-sec-2019-12 - 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585 - 9. https://www.wireshark.org/security/wnpa-sec-2019-13 - 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612 - 11. https://www.wireshark.org/security/wnpa-sec-2019-14 - 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613 - 13. https://www.wireshark.org/security/wnpa-sec-2019-15 - 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617 - 15. https://www.wireshark.org/security/wnpa-sec-2019-16 - 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15619 - 17. https://www.wireshark.org/security/wnpa-sec-2019-17 - 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620 - 19. https://www.wireshark.org/security/wnpa-sec-2019-18 - 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 - 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14770 - 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15439 - 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15533 - 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15542 - 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15545 - 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15549 - 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15561 - 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15565 - 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15572 - 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15578 - 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15599 - 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15605 - 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15607 - 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15608 - 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15627 - 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15628 - 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15630 - 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15631 - 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15634 - 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15647 - 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15648 - 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15656 - 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15667 - 44. https://www.wireshark.org/download.html - 45. https://www.wireshark.org/download.html#thirdparty - 46. https://www.wireshark.org/docs/ - 47. https://ask.wireshark.org/ - 48. https://www.wireshark.org/lists/ - 49. https://bugs.wireshark.org/ - 50. http://www.wiresharktraining.com/ - 51. https://www.wireshark.org/faq.html + 3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10895 + 4. https://www.wireshark.org/security/wnpa-sec-2019-10 + 5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546 + 6. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10899 + 7. https://www.wireshark.org/security/wnpa-sec-2019-11 + 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15553 + 9. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10897 + 10. https://www.wireshark.org/security/wnpa-sec-2019-12 + 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585 + 12. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10898 + 13. https://www.wireshark.org/security/wnpa-sec-2019-13 + 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612 + 15. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10900 + 16. https://www.wireshark.org/security/wnpa-sec-2019-14 + 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613 + 18. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10894 + 19. https://www.wireshark.org/security/wnpa-sec-2019-15 + 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617 + 21. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10896 + 22. https://www.wireshark.org/security/wnpa-sec-2019-16 + 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15619 + 24. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10902 + 25. https://www.wireshark.org/security/wnpa-sec-2019-17 + 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620 + 27. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10901 + 28. https://www.wireshark.org/security/wnpa-sec-2019-18 + 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568 + 30. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10903 + 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14770 + 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15439 + 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15533 + 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15542 + 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15545 + 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15549 + 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15561 + 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15565 + 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15572 + 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15578 + 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15599 + 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15605 + 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15607 + 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15608 + 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15627 + 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15628 + 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15630 + 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15631 + 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15634 + 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15647 + 51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15648 + 52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15656 + 53. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15667 + 54. https://www.wireshark.org/download.html + 55. https://www.wireshark.org/download.html#thirdparty + 56. https://www.wireshark.org/docs/ + 57. https://ask.wireshark.org/ + 58. https://www.wireshark.org/lists/ + 59. https://bugs.wireshark.org/ + 60. http://www.wiresharktraining.com/ + 61. https://www.wireshark.org/faq.html |