Hello community, here is the log from the commit of package wireshark for openSUSE:Factory checked in at Wed May 25 09:44:01 CEST 2011.
-------- --- wireshark/wireshark.changes 2011-04-11 10:15:30.000000000 +0200 +++ /mounts/work_src_done/STABLE/wireshark/wireshark.changes 2011-05-24 17:06:24.000000000 +0200 @@ -1,0 +2,44 @@ +Tue May 24 16:40:30 CEST 2011 - [email protected] + +- Update to version 1.4.6: + + Wireshark and TShark can crash while analyzing TCP packets. + + Updated protocol support: TCP +- Changes from version 1.4.5: + + Security Fixes: + - The NFS dissector could crash on Windows. + - The X.509if dissector could crash + + bugs fixed: + - Cygwin make fails after updating to bash v 4.1.9.2 + - Export HTTP > All - System Appears Hung (but isn't). + - Some HTTP responses don't decode with TCP reassembly on. + - Wireshark crashes when cancelling a large sort operation. + - Wireshark crashes if SSL preferences RSA key is actually a + DSA key. + - tshark incorrectly calculates TCP stream for some syn packets + - Wireshark not able to decode the PPP frame in a sflow + (RFC3176) flow sample packet because Wireshark incorrectly + read the protocol in PPP frame header. (Bug 5746) + - Mysql protocol dissector: all fields should be little endian. + - Error when opening snoop from Juniper SSG-140. + - svnversion: command not found. + - Value of TCP segment data cannot be copied. + - proto_field_is_referenced() is not exported in + libwireshark.dll + - Wireshark ver. 1.4.4 not displayed "Granted QoS" field in a + A11 packet. + + Updated protocol support: + HTTP, LDAP, MySQL, NFS, sFlow, SSL, TCP +- Drop patches (fixed upstream): + + wireshark-1.4.4-CVE-2011-1590.patch + + wireshark-1.4.4-CVE-2011-1591.patch + + wireshark-1.4.4-CVE-2011-1592.patch + +------------------------------------------------------------------- +Tue Apr 26 09:11:54 UTC 2011 - [email protected] + +- security fixes [#bnc 688109] + * CVE-2011-1590: Use of un-initialised variables + * CVE-2011-1592: Crash in NFS dissector on Windows + * CVE-2011-1591: Buffer overflow in DECT dissector + +------------------------------------------------------------------- calling whatdependson for head-i586 Old: ---- wireshark-1.4.4.tar.bz2 New: ---- wireshark-1.4.6.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wireshark.spec ++++++ --- /var/tmp/diff_new_pack.64cgSR/_old 2011-05-25 09:41:49.000000000 +0200 +++ /var/tmp/diff_new_pack.64cgSR/_new 2011-05-25 09:41:49.000000000 +0200 @@ -20,7 +20,7 @@ %define use_caps 0 Name: wireshark -Version: 1.4.4 +Version: 1.4.6 Release: 1 License: GPLv2+ Summary: A Network Traffic Analyser @@ -100,6 +100,7 @@ %patch3 -p1 %patch4 -p1 %patch5 -p1 + sed -i 's/^Icon=wireshark.png$/Icon=wireshark/' wireshark.desktop # run as root on 11.3 and older - bnc#349782 %if ! %{use_caps} @@ -108,7 +109,7 @@ %endif %build -%configure +%configure --without-zlib make %{?_smp_mflags} %install ++++++ wireshark-1.4.4.tar.bz2 -> wireshark-1.4.6.tar.bz2 ++++++ wireshark/wireshark-1.4.4.tar.bz2 /mounts/work_src_done/STABLE/wireshark/wireshark-1.4.6.tar.bz2 differ: char 11, line 1 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun... -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
