Hello community,

here is the log from the commit of package wireshark for openSUSE:11.3
checked in at Tue Nov 15 15:51:55 CET 2011.



--------
--- old-versions/11.3/UPDATES/all/wireshark/wireshark.changes   2011-10-10 
11:12:42.000000000 +0200
+++ 11.3/wireshark/wireshark.changes    2011-11-09 11:08:10.000000000 +0100
@@ -1,0 +2,230 @@
+Tue Nov  8 03:46:43 UTC 2011 - [email protected]
+
+- update to 1.4.10
+  - Security fixes:
+    - wnpa-sec-2011-18 Huzaifa Sidhpurwala of Red Hat Security 
+      Response Team discovered that the Infiniband dissector could 
+      dereference a NULL pointer. (Bug 6476) 
+    - wnpa-sec-2011-19 Huzaifa Sidhpurwala of Red Hat Security 
+      Response Team discovered a buffer overflow in the ERF file 
+      reader. (Bug 6479) 
+  - Bug fixes:
+    - Assertion failed when doing File->Quit->Save during live 
+      capture. (Bug 1710) 
+    - Wrong PCEP XRO sub-object decoding. (Bug 3778)
+    - Decoding [Status Records] Timestamp Sequence Field in Bundle 
+      Protocol fails if over 32 bits. (Bug 4109) 
+    - wireshark-1.4.2 crashes when testing the example python 
+      dissector because of a dissector count assertion. (Bug 5431) 
+    - Wireshark crashes when attempting to open a file via drag & drop
+      when there's already a file open. (Bug 5987) 
+    - Add the ability to save filters from the Filter Toolbar into buttons 
+      on the Filter Toolbar. (Bug 6207) 
+    - Adding and removing custom HTTP headers requires a restart. (Bug 6241)
+    - Can't read full 64-bit SNMP values. (Bug 6295) 
+    - BACnet property time-synchronization-interval (204) name shown 
+      incorrectly as time-synchronization-recipients. (Bug 6336) 
+    - [ASN.1 PER] Incorrect decoding of BIT STRING type. (Bug 6347) 
+    - Export->Object->HTTP-> save all: Error on saving files. (Bug 6362) 
+    - Incorrect identification of UDP-encapsulated NAT-keepalive 
+      packets. (Bug 6414) 
+    - S1AP protocol can't decode IPv6 transportLayerAddress. (Bug 6435)
+    - RTPS2 dissector doesn't handle 0 in the octestToNextHeader field. 
+      (Bug 6449) 
+    - packet-ajp13 fix, cleanup, and enhancement. (Bug 6452) 
+    - Network Instruments Observer file format bugs. (Bug 6453) 
+    - Wireshark crashes when using "Open Recent" 2 times in a row. (Bug 6457)
+    - Wireshark packet_gsm-sms, display bug: Filler bits in TP-User Data
+      Header. (Bug 6469) 
+    - wireshark unable to decode NetFlow options which have system scope 
+      size != 4 bytes. (Bug 6471) 
+    - Display filter Expression Dialog Box Error. (Bug 6472) 
+  - Updated protocol support:
+    - AJP13, ASN.1 PER, BACapp, DTN, GSM SMS, Infiniband, IPsec, NetFlow, 
+      PCEP, RTPS2
+
+- update to 1.4.9
+  - Security fixes:
+    - wnpa-sec-2011-13 A malformed IKE packet could consume excessive 
+      resources.  
+    - wnpa-sec-2011-14 A malformed capture file could result in an invalid 
+      root tvbuff and cause a crash. (Bug 6135) CVE-2011-3266
+    - wnpa-sec-2011-15 Wireshark could run arbitrary Lua scripts. (Bug 6136)
+  - Bug fixes:
+    - Unable to configure zero length SNMP Engine ID. (Bug 5731)
+    - H.323 RAS packets missing from packet counts in "Telephony->VoIP 
+      Calls" and the "Flow Graph" for the call. (Bug 5848)
+    - Malformed Packet in decode for BGP-AD update. (Bug 6122) 
+    - BGP : AS_PATH attribute was decode wrong. (Bug 6188)
+    - Fixes for SCPS TCP option. (Bug 6194) 
+    - Offset calculated incorrectly for sFlow extended data. (Bug 6219) 
+    - [Enter] key behavior varies when manually typing display filters. 
+      (Bug 6228) 
+    - Contents of pcapng EnhancedPacketBlocks with comments aren't 
+      displayed. (Bug 6229) 
+    - Misdecoding 3G Neighbour Cell Information Element in SI2quater 
+      message due to a coding typo. (Bug 6237) 
+    - Mis-spelled word "unknown" in assorted files. (Bug 6244)
+    - btl2cap extended window shows wrong bit. (Bug 6257) 
+    - NDMP dissector incorrectly represents "ndmp.bytes_left_to_read"
+      as signed. (Bug 6262) 
+    - ERF records with extension headers not written out correctly to 
+      pcap or pcap-ng files. (Bug 6265) 
+    - RTPS2: MAX_BITMAP_SIZE is defined incorrectly. (Bug 6276) 
+    - Copying from RTP stream analysis copies 1st line many times. (Bug 6279)
+    - File types with no snaplen written out with a zero snaplen in pcap-ng 
+      files. (Bug 6289)
+    - MEGACO context tracking fix - context id reuse. (Bug 6311)
+  - Updated protocol support:
+    - BGP, Bluetooth L2CAP, GSM A RR, H.225, IKE, MEGACO, NDMP, RTPS2, SCPS, 
+      sFlow, SNMP
+  - New and Updated capture file suppport:
+    - CommView, pcap-ng. 
+
+- update to 1.4.8
+  - Security fixes:
+    - CVE-2011-2597 The Lucent/Ascend file parser was susceptible to an 
+      infinite loop. 
+    - The ANSI MAP dissector was susceptible to an infinite loop. (Bug 6044) 
+  - Bug fixes:
+    - TCP dissector doesn't decode TCP segments of length 1. (Bug 4716) 
+    - Wireshark 1.4.0rc1 and python - spurious message. (Bug 4878) 
+    - Missing LUA function. (Bug 5006) 
+    - Lua API description about creating a new Tvb from a bytearray is not 
+      correct in wireshark's user guide. (Bug 5199)  
+    - sflow decode error for some extended formats. (Bug 5379)
+    - White space in protocol field abbreviation causes runtime failure 
+      while registering Lua dissector. (Bug 5569) 
+    - "File not found" box uses wrong filename encoding. (Bug 5715) 
+    - capinfos: #ifdef HAVE_LIBGCRYPT block includes a line too many. 
+      (Bug 5803) 
+    - Wireshark crashes if Lua contains "Pref.range()" with missing
+      arguments. (Bug 5895)
+    - The "range" field in Lua's "Pref.range()" serves as default while 
+      the "default" field does nothing. (Bug 5896) 
+    - Wireshark crashes when calling TreeItem:set_len() on TreeItem 
+      without tvb. (Bug 5941) 
+    - TvbRange_string(lua_State* L) call a wrong function. (Bug 5960)
+    - VoIP call flow graph displays BICC APM as a BICC ANM. (Bug 5966) 
+    - H323 rate multiplier wrong. (Bug 6009)
+    - tshark crashes when loading Lua script that contains GUI function. 
+      (Bug 6018) 
+    - 802.11 Disassociation Packet's "Reason Code" field is imprecisely
+      decoded/described. (Bug 6022) 
+    - Wireshark crashes when setting custom column's field name with 
+      conditional. (Bug 6028) 
+    - GTS Descriptor count limited to 3 instead of 7. (Bug 6055)
+    - The SSL dissector can not resemble correctly the frames after TCP 
+      zero window probe packet. (Bug 6059) 
+    - Packet parser takes too long for this trace. (Bug 6073)
+    - 802.11 Association Response Packet's "Status Code" field is 
+      imprecisely decoded/described. (Bug 6093) 
+    - Wireshark 1.6.0 and Python support: installer fails to create the 
+      wspy_dissectors subdirectory and . (Bug 6110)
+    - Wireshark crash during RTP stream analysis. (Bug 6120)
+    - Tshark custom columns: Why don't I get an error message? (Bug 6131) 
+  - Updated protocol support:
+    - ANSI MAP, GIOP, H.323, IEEE 802.11, MSRP, RPCAP, sFlow, TCP
+  - New and Updated capture file suppport:
+    - Lucent/Ascend
+
+- update to 1.4.7
+  - Security fixes:
+    - Large/infinite loop in the DICOM dissector. (Bug 5876)
+    - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered 
+      that a corrupted Diameter dictionary file could crash Wireshark. 
+    - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered 
+      that a corrupted snoop file could crash Wireshark. (Bug 5912)
+    - David Maciejak of Fortinet's FortiGuard Labs discovered that malformed 
+      compressed capture data could crash Wireshark. (Bug 5908)
+    - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered 
+      that a corrupted Visual Networks file could crash Wireshark. (Bug 5934) 
+  - Bug fixes:
+    - AIM dissector has some endian issues. (Bug 5464)
+    - Telephony->MTP3->MSUS doesn't display window. (Bug 5605)
+    - Support for MS NetMon 3.x traces containing raw IPv6 ("Type 7")
+      packets. (Bug 5817) 
+    - Service Indicator in M3UA protocol data. (Bug 5834) 
+    - IEC60870-5-104 protocol, incorrect decoding of timestamp type 
+      CP56Time2a. (Bug 5889) 
+    - DNP3 dissector incorrect constants AL_OBJ_FCTR_16NF _FDCTR_32NF 
+      _FDCTR_16NF. (Bug 5920)
+    - 3GPP QoS: Traffic class is not decoded properly. (Bug 5928)
+    - Wireshark crashes when creating ProtoField.framenum in Lua. (Bug 5930)
+    - Fix a wrong mask to extract FMID from DECT packets dissector. (Bug 5947) 
+    - Incorrect DHCPv6 remote identifier option parsing. (Bug 5962) 
+  - Updated protocol support:
+    - DICOM, IEC104, M3UA, TCP
+  - New and Updated capture file suppport:
+    - Network Monitor
+
+- update to 1.4.6
+  - Security fixes:
+    - The NFS dissector could crash on Windows.
+    - The X.509if dissector could crash
+  - Bug fixes:
+    - Cygwin make fails after updating to bash v 4.1.9.2
+    - Export HTTP > All - System Appears Hung (but isn't).
+    - Some HTTP responses don't decode with TCP reassembly on.
+    - Wireshark crashes when cancelling a large sort operation.
+    - Wireshark crashes if SSL preferences RSA key is actually a
+      DSA key.
+    - tshark incorrectly calculates TCP stream for some syn packets
+    - Wireshark not able to decode the PPP frame in a sflow
+      (RFC3176) flow sample packet because Wireshark incorrectly
+      read the protocol in PPP frame header. (Bug 5746)
+    - Mysql protocol dissector: all fields should be little endian.
+    - Error when opening snoop from Juniper SSG-140.
+    - svnversion: command not found.
+    - Value of TCP segment data cannot be copied.
+    - proto_field_is_referenced() is not exported in
+      libwireshark.dll
+    - Wireshark ver. 1.4.4 not displayed "Granted QoS" field in a
+      A11 packet.
+  - Updated protocol support:
+    - HTTP, LDAP, MySQL, NFS, sFlow, SSL, TCP
+
+- update to 1.4.5
+  - Security fixes:
+    - The NFS dissector could crash on Windows. (Bug 5209) 
+    - The X.509if dissector could crash. (Bug 5754, Bug 5793) 
+    - DECT dissector could overflow a buffer. This could allow
+      remote code execution on many platforms. 
+  - Bug fixes:
+    - Export HTTP > All - System Appears Hung (but isn't). (Bug 1671)
+    - Some HTTP responses don't decode with TCP reassembly on. (Bug 3785)
+    - Wireshark crashes when cancelling a large sort operation. (Bug 5189)
+    - Wireshark crashes if SSL preferences RSA key is actually a 
++++ 33 more lines (skipped)
++++ between old-versions/11.3/UPDATES/all/wireshark/wireshark.changes
++++ and 11.3/wireshark/wireshark.changes

calling whatdependson for 11.3-i586


Old:
----
  wireshark-1.2.17-CVE-2011-1957.patch
  wireshark-1.2.17-CVE-2011-1958.patch
  wireshark-1.2.17-CVE-2011-1959.patch
  wireshark-1.2.17-CVE-2011-2174.patch
  wireshark-1.2.17-CVE-2011-2175.patch
  wireshark-1.4.4-CVE-2011-1590.patch
  wireshark-1.4.4-CVE-2011-1591.patch
  wireshark-1.4.4-CVE-2011-1592.patch
  wireshark-1.4.4.tar.bz2
  wireshark-1.4.8-CVE-2011-2597.patch
  wireshark-1.4.8-CVE-2011-2698.patch
  wireshark-1.6.2-CVE-2011-3266.patch
  wireshark-1.6.2-CVE-2011-3360.patch
  wireshark-1.6.2-CVE-2011-3483.patch

New:
----
  wireshark-1.4.10.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ wireshark.spec ++++++
--- /var/tmp/diff_new_pack.0U3LAS/_old  2011-11-15 15:45:51.000000000 +0100
+++ /var/tmp/diff_new_pack.0U3LAS/_new  2011-11-15 15:45:51.000000000 +0100
@@ -20,8 +20,8 @@
 %define use_caps 0
 
 Name:           wireshark
-Version:        1.4.4
-Release:        0.<RELEASE6>
+Version:        1.4.10
+Release:        0.<RELEASE2>
 License:        GPLv2+
 Summary:        A Network Traffic Analyser
 Url:            http://www.wireshark.org/
@@ -36,19 +36,6 @@
 Patch3:         %{name}-corosync-packet-dissector.patch
 Patch4:         %{name}-1.2.4-enable_lua.patch
 Patch5:         %{name}-nfsv4-opts.patch
-Patch6:         %{name}-%{version}-CVE-2011-1592.patch
-Patch7:         %{name}-%{version}-CVE-2011-1590.patch
-Patch8:         %{name}-%{version}-CVE-2011-1591.patch
-Patch9:         %{name}-1.2.17-CVE-2011-1957.patch
-Patch10:        %{name}-1.2.17-CVE-2011-1959.patch
-Patch11:        %{name}-1.2.17-CVE-2011-2174.patch
-Patch12:        %{name}-1.2.17-CVE-2011-2175.patch
-Patch13:        %{name}-1.2.17-CVE-2011-1958.patch
-Patch14:        %{name}-1.4.8-CVE-2011-2597.patch
-Patch15:        %{name}-1.4.8-CVE-2011-2698.patch
-Patch16:        %{name}-1.6.2-CVE-2011-3266.patch
-Patch17:        %{name}-1.6.2-CVE-2011-3360.patch
-Patch18:        %{name}-1.6.2-CVE-2011-3483.patch
 
 BuildRequires:  bison
 BuildRequires:  cairo-devel
@@ -112,19 +99,6 @@
 %patch3 -p1
 %patch4 -p1
 %patch5 -p1
-%patch6 -p1 
-%patch7
-%patch8 -p1
-%patch9 -p1
-%patch10 -p1
-%patch11 -p1
-%patch12 -p1
-%patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
-%patch17 -p1
-%patch18 -p1
 
 sed -i 's/^Icon=wireshark.png$/Icon=wireshark/' wireshark.desktop
 # run as root on 11.3 and older - bnc#349782

++++++ wireshark-1.4.4.tar.bz2 -> wireshark-1.4.10.tar.bz2 ++++++
old-versions/11.3/UPDATES/all/wireshark/wireshark-1.4.4.tar.bz2 
11.3/wireshark/wireshark-1.4.10.tar.bz2 differ: char 11, line 1

continue with "q"...



Remember to have fun...

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to