Hello community, here is the log from the commit of package wireshark for openSUSE:11.4 checked in at Tue Nov 15 15:49:02 CET 2011.
-------- --- old-versions/11.4/UPDATES/all/wireshark/wireshark.changes 2011-10-10 11:17:00.000000000 +0200 +++ 11.4/wireshark/wireshark.changes 2011-11-09 11:04:49.000000000 +0100 @@ -1,0 +2,230 @@ +Tue Nov 8 03:46:43 UTC 2011 - [email protected] + +- update to 1.4.10 + - Security fixes: + - wnpa-sec-2011-18 Huzaifa Sidhpurwala of Red Hat Security + Response Team discovered that the Infiniband dissector could + dereference a NULL pointer. (Bug 6476) + - wnpa-sec-2011-19 Huzaifa Sidhpurwala of Red Hat Security + Response Team discovered a buffer overflow in the ERF file + reader. (Bug 6479) + - Bug fixes: + - Assertion failed when doing File->Quit->Save during live + capture. (Bug 1710) + - Wrong PCEP XRO sub-object decoding. (Bug 3778) + - Decoding [Status Records] Timestamp Sequence Field in Bundle + Protocol fails if over 32 bits. (Bug 4109) + - wireshark-1.4.2 crashes when testing the example python + dissector because of a dissector count assertion. (Bug 5431) + - Wireshark crashes when attempting to open a file via drag & drop + when there's already a file open. (Bug 5987) + - Add the ability to save filters from the Filter Toolbar into buttons + on the Filter Toolbar. (Bug 6207) + - Adding and removing custom HTTP headers requires a restart. (Bug 6241) + - Can't read full 64-bit SNMP values. (Bug 6295) + - BACnet property time-synchronization-interval (204) name shown + incorrectly as time-synchronization-recipients. (Bug 6336) + - [ASN.1 PER] Incorrect decoding of BIT STRING type. (Bug 6347) + - Export->Object->HTTP-> save all: Error on saving files. (Bug 6362) + - Incorrect identification of UDP-encapsulated NAT-keepalive + packets. (Bug 6414) + - S1AP protocol can't decode IPv6 transportLayerAddress. (Bug 6435) + - RTPS2 dissector doesn't handle 0 in the octestToNextHeader field. + (Bug 6449) + - packet-ajp13 fix, cleanup, and enhancement. (Bug 6452) + - Network Instruments Observer file format bugs. (Bug 6453) + - Wireshark crashes when using "Open Recent" 2 times in a row. (Bug 6457) + - Wireshark packet_gsm-sms, display bug: Filler bits in TP-User Data + Header. (Bug 6469) + - wireshark unable to decode NetFlow options which have system scope + size != 4 bytes. (Bug 6471) + - Display filter Expression Dialog Box Error. (Bug 6472) + - Updated protocol support: + - AJP13, ASN.1 PER, BACapp, DTN, GSM SMS, Infiniband, IPsec, NetFlow, + PCEP, RTPS2 + +- update to 1.4.9 + - Security fixes: + - wnpa-sec-2011-13 A malformed IKE packet could consume excessive + resources. + - wnpa-sec-2011-14 A malformed capture file could result in an invalid + root tvbuff and cause a crash. (Bug 6135) CVE-2011-3266 + - wnpa-sec-2011-15 Wireshark could run arbitrary Lua scripts. (Bug 6136) + - Bug fixes: + - Unable to configure zero length SNMP Engine ID. (Bug 5731) + - H.323 RAS packets missing from packet counts in "Telephony->VoIP + Calls" and the "Flow Graph" for the call. (Bug 5848) + - Malformed Packet in decode for BGP-AD update. (Bug 6122) + - BGP : AS_PATH attribute was decode wrong. (Bug 6188) + - Fixes for SCPS TCP option. (Bug 6194) + - Offset calculated incorrectly for sFlow extended data. (Bug 6219) + - [Enter] key behavior varies when manually typing display filters. + (Bug 6228) + - Contents of pcapng EnhancedPacketBlocks with comments aren't + displayed. (Bug 6229) + - Misdecoding 3G Neighbour Cell Information Element in SI2quater + message due to a coding typo. (Bug 6237) + - Mis-spelled word "unknown" in assorted files. (Bug 6244) + - btl2cap extended window shows wrong bit. (Bug 6257) + - NDMP dissector incorrectly represents "ndmp.bytes_left_to_read" + as signed. (Bug 6262) + - ERF records with extension headers not written out correctly to + pcap or pcap-ng files. (Bug 6265) + - RTPS2: MAX_BITMAP_SIZE is defined incorrectly. (Bug 6276) + - Copying from RTP stream analysis copies 1st line many times. (Bug 6279) + - File types with no snaplen written out with a zero snaplen in pcap-ng + files. (Bug 6289) + - MEGACO context tracking fix - context id reuse. (Bug 6311) + - Updated protocol support: + - BGP, Bluetooth L2CAP, GSM A RR, H.225, IKE, MEGACO, NDMP, RTPS2, SCPS, + sFlow, SNMP + - New and Updated capture file suppport: + - CommView, pcap-ng. + +- update to 1.4.8 + - Security fixes: + - CVE-2011-2597 The Lucent/Ascend file parser was susceptible to an + infinite loop. + - The ANSI MAP dissector was susceptible to an infinite loop. (Bug 6044) + - Bug fixes: + - TCP dissector doesn't decode TCP segments of length 1. (Bug 4716) + - Wireshark 1.4.0rc1 and python - spurious message. (Bug 4878) + - Missing LUA function. (Bug 5006) + - Lua API description about creating a new Tvb from a bytearray is not + correct in wireshark's user guide. (Bug 5199) + - sflow decode error for some extended formats. (Bug 5379) + - White space in protocol field abbreviation causes runtime failure + while registering Lua dissector. (Bug 5569) + - "File not found" box uses wrong filename encoding. (Bug 5715) + - capinfos: #ifdef HAVE_LIBGCRYPT block includes a line too many. + (Bug 5803) + - Wireshark crashes if Lua contains "Pref.range()" with missing + arguments. (Bug 5895) + - The "range" field in Lua's "Pref.range()" serves as default while + the "default" field does nothing. (Bug 5896) + - Wireshark crashes when calling TreeItem:set_len() on TreeItem + without tvb. (Bug 5941) + - TvbRange_string(lua_State* L) call a wrong function. (Bug 5960) + - VoIP call flow graph displays BICC APM as a BICC ANM. (Bug 5966) + - H323 rate multiplier wrong. (Bug 6009) + - tshark crashes when loading Lua script that contains GUI function. + (Bug 6018) + - 802.11 Disassociation Packet's "Reason Code" field is imprecisely + decoded/described. (Bug 6022) + - Wireshark crashes when setting custom column's field name with + conditional. (Bug 6028) + - GTS Descriptor count limited to 3 instead of 7. (Bug 6055) + - The SSL dissector can not resemble correctly the frames after TCP + zero window probe packet. (Bug 6059) + - Packet parser takes too long for this trace. (Bug 6073) + - 802.11 Association Response Packet's "Status Code" field is + imprecisely decoded/described. (Bug 6093) + - Wireshark 1.6.0 and Python support: installer fails to create the + wspy_dissectors subdirectory and . (Bug 6110) + - Wireshark crash during RTP stream analysis. (Bug 6120) + - Tshark custom columns: Why don't I get an error message? (Bug 6131) + - Updated protocol support: + - ANSI MAP, GIOP, H.323, IEEE 802.11, MSRP, RPCAP, sFlow, TCP + - New and Updated capture file suppport: + - Lucent/Ascend + +- update to 1.4.7 + - Security fixes: + - Large/infinite loop in the DICOM dissector. (Bug 5876) + - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered + that a corrupted Diameter dictionary file could crash Wireshark. + - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered + that a corrupted snoop file could crash Wireshark. (Bug 5912) + - David Maciejak of Fortinet's FortiGuard Labs discovered that malformed + compressed capture data could crash Wireshark. (Bug 5908) + - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered + that a corrupted Visual Networks file could crash Wireshark. (Bug 5934) + - Bug fixes: + - AIM dissector has some endian issues. (Bug 5464) + - Telephony->MTP3->MSUS doesn't display window. (Bug 5605) + - Support for MS NetMon 3.x traces containing raw IPv6 ("Type 7") + packets. (Bug 5817) + - Service Indicator in M3UA protocol data. (Bug 5834) + - IEC60870-5-104 protocol, incorrect decoding of timestamp type + CP56Time2a. (Bug 5889) + - DNP3 dissector incorrect constants AL_OBJ_FCTR_16NF _FDCTR_32NF + _FDCTR_16NF. (Bug 5920) + - 3GPP QoS: Traffic class is not decoded properly. (Bug 5928) + - Wireshark crashes when creating ProtoField.framenum in Lua. (Bug 5930) + - Fix a wrong mask to extract FMID from DECT packets dissector. (Bug 5947) + - Incorrect DHCPv6 remote identifier option parsing. (Bug 5962) + - Updated protocol support: + - DICOM, IEC104, M3UA, TCP + - New and Updated capture file suppport: + - Network Monitor + +- update to 1.4.6 + - Security fixes: + - The NFS dissector could crash on Windows. + - The X.509if dissector could crash + - Bug fixes: + - Cygwin make fails after updating to bash v 4.1.9.2 + - Export HTTP > All - System Appears Hung (but isn't). + - Some HTTP responses don't decode with TCP reassembly on. + - Wireshark crashes when cancelling a large sort operation. + - Wireshark crashes if SSL preferences RSA key is actually a + DSA key. + - tshark incorrectly calculates TCP stream for some syn packets + - Wireshark not able to decode the PPP frame in a sflow + (RFC3176) flow sample packet because Wireshark incorrectly + read the protocol in PPP frame header. (Bug 5746) + - Mysql protocol dissector: all fields should be little endian. + - Error when opening snoop from Juniper SSG-140. + - svnversion: command not found. + - Value of TCP segment data cannot be copied. + - proto_field_is_referenced() is not exported in + libwireshark.dll + - Wireshark ver. 1.4.4 not displayed "Granted QoS" field in a + A11 packet. + - Updated protocol support: + - HTTP, LDAP, MySQL, NFS, sFlow, SSL, TCP + +- update to 1.4.5 + - Security fixes: + - The NFS dissector could crash on Windows. (Bug 5209) + - The X.509if dissector could crash. (Bug 5754, Bug 5793) + - DECT dissector could overflow a buffer. This could allow + remote code execution on many platforms. + - Bug fixes: + - Export HTTP > All - System Appears Hung (but isn't). (Bug 1671) + - Some HTTP responses don't decode with TCP reassembly on. (Bug 3785) + - Wireshark crashes when cancelling a large sort operation. (Bug 5189) + - Wireshark crashes if SSL preferences RSA key is actually a ++++ 33 more lines (skipped) ++++ between old-versions/11.4/UPDATES/all/wireshark/wireshark.changes ++++ and 11.4/wireshark/wireshark.changes calling whatdependson for 11.4-i586 Old: ---- wireshark-1.2.17-CVE-2011-1957.patch wireshark-1.2.17-CVE-2011-1958.patch wireshark-1.2.17-CVE-2011-1959.patch wireshark-1.2.17-CVE-2011-2174.patch wireshark-1.2.17-CVE-2011-2175.patch wireshark-1.4.4-CVE-2011-1590.patch wireshark-1.4.4-CVE-2011-1591.patch wireshark-1.4.4-CVE-2011-1592.patch wireshark-1.4.4.tar.bz2 wireshark-1.4.8-CVE-2011-2597.patch wireshark-1.4.8-CVE-2011-2698.patch wireshark-1.6.2-CVE-2011-3266.patch wireshark-1.6.2-CVE-2011-3360.patch wireshark-1.6.2-CVE-2011-3483.patch New: ---- wireshark-1.4.10.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wireshark.spec ++++++ --- /var/tmp/diff_new_pack.pAjxRS/_old 2011-11-15 15:48:38.000000000 +0100 +++ /var/tmp/diff_new_pack.pAjxRS/_new 2011-11-15 15:48:38.000000000 +0100 @@ -20,8 +20,8 @@ %define use_caps 0 Name: wireshark -Version: 1.4.4 -Release: 0.<RELEASE7> +Version: 1.4.10 +Release: 0.<RELEASE2> License: GPLv2+ Summary: A Network Traffic Analyser Url: http://www.wireshark.org/ @@ -38,19 +38,6 @@ Patch4: %{name}-1.2.4-enable_lua.patch # PATCH-FEATURE-OPENSUSE wireshark-nfsv4-opts.patch -- add NFSv4 options Patch5: %{name}-nfsv4-opts.patch -Patch6: %{name}-%{version}-CVE-2011-1592.patch -Patch7: %{name}-%{version}-CVE-2011-1590.patch -Patch8: %{name}-%{version}-CVE-2011-1591.patch -Patch9: %{name}-1.2.17-CVE-2011-1957.patch -Patch10: %{name}-1.2.17-CVE-2011-1959.patch -Patch11: %{name}-1.2.17-CVE-2011-2174.patch -Patch12: %{name}-1.2.17-CVE-2011-2175.patch -Patch13: %{name}-1.2.17-CVE-2011-1958.patch -Patch14: %{name}-1.4.8-CVE-2011-2597.patch -Patch15: %{name}-1.4.8-CVE-2011-2698.patch -Patch16: %{name}-1.6.2-CVE-2011-3266.patch -Patch17: %{name}-1.6.2-CVE-2011-3360.patch -Patch18: %{name}-1.6.2-CVE-2011-3483.patch BuildRequires: bison BuildRequires: cairo-devel BuildRequires: flex @@ -113,19 +100,6 @@ %patch3 -p1 %patch4 -p1 %patch5 -p1 -%patch6 -p1 -%patch7 -%patch8 -p1 -%patch9 -p1 -%patch10 -p1 -%patch11 -p1 -%patch12 -p1 -%patch13 -p1 -%patch14 -p1 -%patch15 -p1 -%patch16 -p1 -%patch17 -p1 -%patch18 -p1 sed -i 's/^Icon=wireshark.png$/Icon=wireshark/' wireshark.desktop # run as root on 11.3 and older - bnc#349782 ++++++ wireshark-1.4.4.tar.bz2 -> wireshark-1.4.10.tar.bz2 ++++++ old-versions/11.4/UPDATES/all/wireshark/wireshark-1.4.4.tar.bz2 11.4/wireshark/wireshark-1.4.10.tar.bz2 differ: char 11, line 1 continue with "q"... Remember to have fun... -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
