Hello community, here is the log from the commit of package wireshark.3783 for openSUSE:13.1:Update checked in at 2015-05-24 16:25:39 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.1:Update/wireshark.3783 (Old) and /work/SRC/openSUSE:13.1:Update/.wireshark.3783.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "wireshark.3783" Changes: -------- New Changes file: --- /dev/null 2015-05-15 19:41:08.266053825 +0200 +++ /work/SRC/openSUSE:13.1:Update/.wireshark.3783.new/wireshark.changes 2015-05-24 16:25:41.000000000 +0200 @@ -0,0 +1,2775 @@ +------------------------------------------------------------------- +Wed May 13 15:59:00 UTC 2015 - [email protected] + +- Wireshark 1.10.14 [boo#930691] +- The following vulnerabilities have been fixed: + * The WCP dissector could crash while decompressing data. + CVE-2015-3811 wnpa-sec-2015-14 + * The X11 dissector could leak memory. + CVE-2015-3812 wnpa-sec-2015-15 + * The IEEE 802.11 dissector could go into an infinite loop. + CVE-2015-3814 wnpa-sec-2015-17 +- Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.14.html + +------------------------------------------------------------------- +Wed Mar 4 20:53:07 UTC 2015 - [email protected] + +- Wireshark 1.10.13 +- The following security issues were fixed: + * The WCP dissector could crash. + wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] + * The pcapng file parser could crash. + wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] + * The TNEF dissector could go into an infinite loop. + wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] +- Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html + +------------------------------------------------------------------- + +Fri Jan 9 22:42:38 UTC 2015 - [email protected] + +- Wireshark 1.10.12 +- The following vulnerabilities allowed Wireshark to be crashed by + injecting a malformed packet onto the wire or by convincing someone + to read a malformed packet trace file. + + The WCCP dissector could crash + wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365] + + The LPP dissector could crash. + wnpa-sec-2015-02 CVE-2015-0561 [boo#912368] + + The DEC DNA Routing Protocol dissector could crash. + wnpa-sec-2015-03 CVE-2015-0562 [boo#912369] + + The SMTP dissector could crash. + wnpa-sec-2015-04 CVE-2015-0563 [boo#912370] + + Wireshark could crash while decypting TLS/SSL sessions. + wnpa-sec-2015-05 CVE-2015-0564 [boo#912372] +- build with PIE +- fix compile error, add wireshark-1.10.12-fix-wmem-headers.patch +- Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.12.html + +------------------------------------------------------------------- +Thu Nov 13 18:38:56 UTC 2014 - [email protected] + +- Wireshark 1.10.11 +- The following vulnerabilities have been fixed. + + SigComp UDVM buffer overflow + wnpa-sec-2014-20 CVE-2014-8710 boo#905246 + + AMQP crash + wnpa-sec-2014-21 CVE-2014-8711 boo#905245 + + NCP crashes + wnpa-sec-2014-22 CVE-2014-8712 CVE-2014-8713 boo#905248 + + TN5250 infinite loops + wnpa-sec-2014-23 CVE-2014-8714 boo#905247 +- Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html + +------------------------------------------------------------------- +Sat Sep 20 18:21:53 UTC 2014 - [email protected] + +- update to 1.10.10 [bnc#897055] + This update fixes vulnerabilities in Wireshark that could allow + an attacker to crash Wireshark or make it become unresponsive by + sending specific packages onto the network or have it loaded via + a capture file while the dissectors are running. It also contains + a number of other bug fixes. + * RTP dissector crash + wnpa-sec-2014-12 CVE-2014-6421 CVE-2014-6422 + * MEGACO dissector infinite loop + wnpa-sec-2014-13 CVE-2014-6423 + * Netflow dissector crash + wnpa-sec-2014-14 CVE-2014-6424 + * RTSP dissector crash + wnpa-sec-2014-17 CVE-2014-6427 + * SES dissector crash + wnpa-sec-2014-18 CVE-2014-6428 + * Sniffer file parser crash + wnpa-sec-2014-19 CVE-2014-6429 CVE-2014-6430 CVE-2014-6431 + CVE-2014-6432 +- Further bug fixes as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.10.html + +------------------------------------------------------------------- +Fri Aug 01 23:28:38 UTC 2014 - [email protected] + +- update to 1.10.9 + fixes several crashes triggered by malformed protocol packages +- vulnerabilities fixed: + * The Catapult DCT2000 and IrDA dissectors could underrun a buffer + wnpa-sec-2014-08 CVE-2014-5161 CVE-2014-5162 (bnc#889901) + * The GSM Management dissector could crash + wnpa-sec-2014-09 CVE-2014-5163 (bnc#889906) + * The RLC dissector could crash + wnpa-sec-2014-10 CVE-2014-5164 (bnc#889900) + * The ASN.1 BER dissector could crash + wnpa-sec-2014-11 CVE-2014-5165 (bnc#889899) +- Further bug fixes as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.9.html + +------------------------------------------------------------------- +Fri Jun 13 21:32:43 UTC 2014 - [email protected] + +- update to 1.10.8 [bnc#882602] + + vulnerabilities fixed: + * The frame metadissector could crash. + wnpa-sec-2014-07 CVE-2014-4020 + + bug fixed: + * VoIP flow graph crash upon opening. + * Tshark with "-F pcap" still generates a pcapng file. + * IPv6 Next Header 0x3d recognized as SHIM6. + * Failed to export pdml on large pcap. + * TCAP: set a fence on info column after calling sub + dissector + * Dissector bug in JSON protocol. + * GSM RLC MAC: do not skip too many lines of the CSN_DESCR + when the field is missing + * Wireshark PEEKREMOTE incorrectly decoding QoS data packets + from Cisco Sniffer APs. + * IEEE 802.11: fix dissection of HT Capabilities + + Further updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.8.html + +------------------------------------------------------------------- +Wed Apr 23 17:57:54 UTC 2014 - [email protected] + +- update to 1.10.7 [bnc#874760] + + vulnerabilities fixed: + * The RTP dissector could crash + wnpa-sec-2014-06 CVE-2014-2907 + + Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.7.html + +------------------------------------------------------------------- +Sat Mar 8 10:10:14 UTC 2014 - [email protected] + +- update to 1.10.6 [bnc#867485] + + vulnerabilities fixed: + * The NFS dissector could crash + wnpa-sec-2014-01 CVE-2014-2281 + * The M3UA dissector could crash + wnpa-sec-2014-02 CVE-2014-2282 + * The RLC dissector could crash + wnpa-sec-2014-03 CVE-2014-2283 + * The MPEG file parser could overflow a buffer + wnpa-sec-2014-04 CVE-2014-2299 + + Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.6.html + +------------------------------------------------------------------- +Thu Dec 19 23:25:37 UTC 2013 - [email protected] + +- update to 1.10.5 + + bugs fixed: + * Wireshark stops showing new packets but dumpcap keeps writing + them to the temp file. + * Wireshark 1.10.4 shuts down when promiscuous mode is + unchecked. + * Homeplug dissector bug: STATUS_ACCESS_VIOLATION: dissector + accessed an invalid memory address. + +------------------------------------------------------------------- +Tue Dec 17 22:16:16 UTC 2013 - [email protected] + +- update to 1.10.4 [bnc#855980] + + vulnerabilities fixed: + * The SIP dissector could go into an infinite loop. + wnpa-sec-2013-66 CVE-2013-7112 + * The BSSGP dissector could crash. + wnpa-sec-2013-67 CVE-2013-7113 + * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. + wnpa-sec-2013-68 CVE-2013-7114 + + Further bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-1.10.4.html + +------------------------------------------------------------------- +Fri Nov 1 21:44:02 UTC 2013 - [email protected] + +- update to 1.10.3 [bnc#848738] + + vulnerabilities fixed: + * The IEEE 802.15.4 dissector could crash + wnpa-sec-2013-61 CVE-2013-6336 + * The NBAP dissector could crash + wnpa-sec-2013-62 CVE-2013-6337 + * The SIP dissector could crash + wnpa-sec-2013-63 CVE-2013-6338 + * The OpenWire dissector could go into a large loop + wnpa-sec-2013-64 CVE-2013-6339 ++++ 2578 more lines (skipped) ++++ between /dev/null ++++ and /work/SRC/openSUSE:13.1:Update/.wireshark.3783.new/wireshark.changes New: ---- SIGNATURES-1.10.14.txt wireshark-1.10.0-authors-pod2man.patch wireshark-1.10.0-enable_lua.patch wireshark-1.10.12-fix-wmem-headers.patch wireshark-1.10.14.tar.bz2 wireshark-1.2.0-disable-warning-dialog.patch wireshark-1.2.0-geoip.patch wireshark.changes wireshark.keyring wireshark.spec ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wireshark.spec ++++++ # # spec file for package wireshark # # Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via http://bugs.opensuse.org/ # # disable caps for now %define use_caps 0 # openSUSE Factory gtk3 deprecates gtk2 elements used %define use_gtk3 0 Name: wireshark Version: 1.10.14 Release: 0 Summary: A Network Traffic Analyser License: GPL-2.0+ and GPL-3.0+ Group: Productivity/Networking/Diagnostic Url: https://www.wireshark.org/ Source: https://www.wireshark.org/download/src/%{name}-%{version}.tar.bz2 Source2: https://www.wireshark.org/download/SIGNATURES-%{version}.txt Source3: https://www.wireshark.org/download/gerald_at_wireshark_dot_org.gpg#/wireshark.keyring # PATCH-FIX-OPENSUSE wireshark-1.6.3-disable-warning-dialog.patch bnc#349782 [email protected] -- don't show warning when running as root Patch1: wireshark-1.2.0-disable-warning-dialog.patch # PATCH-FEATURE-OPENSUSE wireshark-1.2.0-geoip.patch [email protected] -- search in /var/lib/GeoIP if user hasn't set any GeoIP folders Patch2: wireshark-1.2.0-geoip.patch Patch4: wireshark-1.10.0-enable_lua.patch Patch5: wireshark-1.10.0-authors-pod2man.patch Patch6: wireshark-1.10.12-fix-wmem-headers.patch BuildRequires: bison BuildRequires: cairo-devel BuildRequires: flex %if 0%{?suse_version} <= 1140 BuildRequires: gtk2-devel %else %if 0%{?use_gtk3} BuildRequires: gtk3-devel %else BuildRequires: gtk2-devel %endif %endif BuildRequires: krb5-devel BuildRequires: libcap-devel BuildRequires: libcares-devel BuildRequires: libgcrypt-devel BuildRequires: libgnutls-devel BuildRequires: libpcap-devel BuildRequires: libsmi-devel # required for Lua support in openSUSE 12.2 and later [bnc#780669] %if 0%{?suse_version} >= 1220 BuildRequires: lua51-devel %else BuildRequires: lua-devel %endif BuildRequires: net-snmp-devel BuildRequires: openssl-devel BuildRequires: pcre-devel BuildRequires: portaudio-devel BuildRequires: python-devel BuildRequires: tcpd-devel BuildRequires: xdg-utils %if 0%{?suse_version} > 1220 BuildRequires: zlib-devel %endif Requires: xdg-utils Provides: ethereal = %{version} Obsoletes: ethereal < %{version} BuildRoot: %{_tmppath}/%{name}-%{version}-build %if 0%{?suse_version} BuildRequires: libGeoIP-devel BuildRequires: update-desktop-files Recommends: GeoIP %endif %if 0%{?suse_version} >= 1230 BuildRequires: gpg-offline %endif %description Wireshark is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, viewing summary and detail information for each packet. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. %package devel Summary: A Network Traffic Analyser Group: Development/Libraries/C and C++ Requires: %{name} = %{version} Requires: glib2-devel Requires: glibc-devel Provides: ethereal-devel = %{version} Obsoletes: ethereal-devel < %{version} %description devel Wireshark is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, viewing summary and detail information for each packet. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. %prep %{?gpg_verify: %gpg_verify %{S:2}} # The publisher doesn't sign the source tarball, but a signatures file containing multiple hashes. # Verify hashes in that file against source tarball. echo "`grep %{name}-%{version}.tar.bz2 %{S:2} | grep MD5 | head -n1 | cut -d= -f2` %{S:0}" | md5sum -c echo "`grep %{name}-%{version}.tar.bz2 %{S:2} | grep SHA1 | head -n1 | cut -d= -f2` %{S:0}" | sha1sum -c %setup -q %patch2 %patch4 -p1 sed -i 's/^Icon=wireshark.png$/Icon=wireshark/' wireshark.desktop # run as root on 11.3 and older - bnc#349782 %if ! %{use_caps} %patch1 sed -i 's!^Exec=wireshark!Exec=/usr/bin/xdg-su -c /usr/bin/wireshark!' wireshark.desktop %endif %patch5 -p1 %patch6 -p1 %build # zlib-1.2.5 does not work well with wireshark, so disable it on pre-12.2 export CFLAGS="%optflags -fPIE" export CXXFLAGS="%optflags -fPIE" export LDFLAGS="-pie" %configure \ %if 0%{?suse_version} < 1220 --without-zlib \ %endif %if 0%{?suse_version} > 1140 %if 0%{?use_gtk3} --with-gtk3 \ %endif %endif --with-ssl \ --with-gnutls=yes \ --with-gcrypt=yes \ --with-python \ --with-plugins=%{_libdir}/%{name}/plugins/%{version} make %{?_smp_mflags} %install make DESTDIR=%{buildroot} install find %{buildroot} -name "*.la" -delete -print ln -fs wireshark %{buildroot}%{_bindir}/ethereal ln -fs tshark %{buildroot}%{_bindir}/tethereal install -d -m 0755 %{buildroot}%{_sysconfdir} install -d -m 0755 %{buildroot}%{_mandir}/man1/ # install -m 0644 *.1 %%{buildroot}%%{_mandir}/man1/ # -devel install -d -m 0755 %{buildroot}%{_includedir}/wireshark IDIR="${RPM_BUILD_ROOT}%{_includedir}/wireshark" mkdir -p "${IDIR}/epan" mkdir -p "${IDIR}/epan/crypt" mkdir -p "${IDIR}/epan/ftypes" mkdir -p "${IDIR}/epan/dfilter" mkdir -p "${IDIR}/epan/dissectors" mkdir -p "${IDIR}/wiretap" mkdir -p "${IDIR}/wsutil" install -m 644 color.h config.h register.h "${IDIR}/" install -m 644 cfile.h file.h "${IDIR}/" install -m 644 frame_data_sequence.h "${IDIR}/" install -m 644 packet-range.h print.h "${IDIR}/" install -m 644 epan/*.h "${IDIR}/epan/" install -m 644 epan/crypt/*.h "${IDIR}/epan/crypt" install -m 644 epan/ftypes/*.h "${IDIR}/epan/ftypes" install -m 644 epan/dfilter/*.h "${IDIR}/epan/dfilter" install -m 644 epan/dissectors/*.h "${IDIR}/epan/dissectors" install -m 644 wiretap/*.h "${IDIR}/wiretap" install -m 644 wsutil/*.h "${IDIR}/wsutil" install -m 644 ws_symbol_export.h "${IDIR}/" install -D -m 0644 image/wsicon48.png %{buildroot}%{_datadir}/pixmaps/wireshark.png install -D -m 0644 wireshark.desktop %{buildroot}%{_datadir}/applications/wireshark.desktop %if 0%{?suse_version} %suse_update_desktop_file %{name} %endif %clean rm -rf %{buildroot} %if %{use_caps} %pre getent group wireshark >/dev/null || groupadd wireshark %endif %post -p /sbin/ldconfig %postun -p /sbin/ldconfig %files %defattr(-,root,root) %doc AUTHORS COPYING NEWS README README.linux README.vmware %doc %{_mandir}/man1/[^i]* %doc %{_mandir}/man4/* %{_datadir}/applications/wireshark.desktop %{_datadir}/pixmaps/wireshark.png %{_bindir}/ethereal %{_bindir}/tethereal %{_bindir}/wireshark %{_bindir}/editcap %{_bindir}/tshark %{_bindir}/mergecap %{_bindir}/reordercap %{_bindir}/text2pcap %{_bindir}/dftest %{_bindir}/capinfos %{_bindir}/randpkt %if %{use_caps} %attr(0750,root,wireshark) %caps(cap_net_raw,cap_net_admin=eip) %{_bindir}/dumpcap %else %{_bindir}/dumpcap %endif %{_bindir}/rawshark %{_libdir}/lib*.so.* %{_libdir}/wireshark/ %{_datadir}/wireshark/ %files devel %defattr(-,root,root) %doc doc/README.* %{_includedir}/wireshark %{_libdir}/lib*.so %changelog ++++++ SIGNATURES-1.10.14.txt ++++++ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 wireshark-1.10.14.tar.bz2: 26905113 bytes MD5(wireshark-1.10.14.tar.bz2)=54822600bdf7fe8c7957b4cbc4e2af7e SHA1(wireshark-1.10.14.tar.bz2)=47c359dc1b9791d2091887a26fdba65f4a7ef3b8 RIPEMD160(wireshark-1.10.14.tar.bz2)=7a14c8a2a7c991893ceef1572fe216f74f9992cf Wireshark-win64-1.10.14.exe: 28052376 bytes MD5(Wireshark-win64-1.10.14.exe)=c10e768449674dccc36c3e40f214a752 SHA1(Wireshark-win64-1.10.14.exe)=6b5fce470244787b180546e8b9ee3224860e033e RIPEMD160(Wireshark-win64-1.10.14.exe)=26096426878d4b57633ad4d548eec2d473637890 Wireshark-win32-1.10.14.exe: 22205680 bytes MD5(Wireshark-win32-1.10.14.exe)=b818ecbd661ab30a7b50d8d990e70ac7 SHA1(Wireshark-win32-1.10.14.exe)=37f74c6f3e73550904e621ae2f5ad342be5762f6 RIPEMD160(Wireshark-win32-1.10.14.exe)=114179f7e4dd90b8556d5fff809672231109486f Wireshark-1.10.14.u3p: 30714093 bytes MD5(Wireshark-1.10.14.u3p)=dc095902b557c37e6b05db02d1678849 SHA1(Wireshark-1.10.14.u3p)=8f1f9b2a7cab7454eec0c305893dd8c00b476833 RIPEMD160(Wireshark-1.10.14.u3p)=1a3c6b65bf808d7b7701fd178120bacfd5acb95a WiresharkPortable-1.10.14.paf.exe: 23577608 bytes MD5(WiresharkPortable-1.10.14.paf.exe)=93548b38e01fe6189fa45c6586174dd4 SHA1(WiresharkPortable-1.10.14.paf.exe)=97c082f34b3edf64f673762585826807e60b3903 RIPEMD160(WiresharkPortable-1.10.14.paf.exe)=edb4cbe6af8e4fc1ec7ed2eca33540aaabcb81bd Wireshark 1.10.14 Intel 64.dmg: 24845121 bytes MD5(Wireshark 1.10.14 Intel 64.dmg)=7e83432efefde872b5cf369f6b9383c3 SHA1(Wireshark 1.10.14 Intel 64.dmg)=8192771f676d1d7b7f3ae475972f994f483b8024 RIPEMD160(Wireshark 1.10.14 Intel 64.dmg)=7a0b62f5bd69167ac7b8b7d66d43c429e3ef3fc3 Wireshark 1.10.14 Intel 32.dmg: 20546738 bytes MD5(Wireshark 1.10.14 Intel 32.dmg)=6b6630feedb9348e39a377f83f605641 SHA1(Wireshark 1.10.14 Intel 32.dmg)=e0dc0388962ff486987c2fc93e7e531c6df73926 RIPEMD160(Wireshark 1.10.14 Intel 32.dmg)=760e4067dc78ef49f324892a0b8c81ec4ecab329 patch-wireshark-1.10.13-to-1.10.14.bz2: 131484 bytes MD5(patch-wireshark-1.10.13-to-1.10.14.bz2)=0d57239f7a254193ccf25b9a349755fa SHA1(patch-wireshark-1.10.13-to-1.10.14.bz2)=baa2277420d16d97aa9c6e066d094606d87340ce RIPEMD160(patch-wireshark-1.10.13-to-1.10.14.bz2)=9112865563cb11c8504ac4502501266f929d66e0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlVSaakACgkQpw8IXSHylJrUggCguRJ9vEjVlPflQl2h3cAkBPKQ H60An278bYAPobNJuccUOL+HWXzTlUA4 =/pXl -----END PGP SIGNATURE----- ++++++ wireshark-1.10.0-authors-pod2man.patch ++++++ From: Andreas Stieger <[email protected]> Date: Thu, 27 Jun 2013 21:02:17 +0100 Subject: [patch] change characters in AUTHORS file to be compatible with pod2man Upstream: never * remove some characters for which Pod::Man does not have an escape sequence * replace cyrillic name with transliteration Wide character in printf at /usr/lib/perl5/5.18.0/Pod/Simple.pm line 539. wireshark.pod around line 3455: Non-ASCII character seen before =encoding in 'Moń'. Assuming UTF-8 POD document had syntax errors at /usr/bin/pod2man line 71. make: *** [wireshark.1] Error 255 error: Bad exit status from /var/tmp/rpm-tmp.PtRL60 (%build) --- AUTHORS | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) Index: wireshark-1.10.0/AUTHORS =================================================================== --- wireshark-1.10.0.orig/AUTHORS 2013-05-29 17:52:27.000000000 +0100 +++ wireshark-1.10.0/AUTHORS 2013-06-27 20:04:34.000000000 +0100 @@ -3509,7 +3509,7 @@ Peter Hatina <phatina[AT]redhat.com> { Gtk3 Wireshark fixes } -Tomasz Moń <desowin[AT]gmail.com> { +Tomasz Mon <desowin[AT]gmail.com> { USBPcap support } @@ -3612,7 +3612,7 @@ Cvetan Ivanov <zezo[AT]spnet.net> Vasanth Manickam <vasanth.manickam[AT]bt.com> Julian Onions <julian.onions[AT]gmail.com> Samuel Thibault <samuel.thibault[AT]ens-lyon.org> -Peter Kovář <peter.kovar[AT]gmail.com> +Peter Kovár <peter.kovar[AT]gmail.com> Paul Ollis <paul.ollis[AT]roke.co.uk> Dominik Kuhlen <dkuhlen[AT]gmx.net> Karl Knoebl <karl.knoebl[AT]siemens.com> @@ -3703,7 +3703,7 @@ Paul Stath <pstath[AT]axxcelera.com> DeCount <aatrade[AT]libero.it> Andras Veres-Szentkiralyi <vsza[AT]vsza.hu> Jakob Hirsch <jh.wireshark-bugzilla[AT]plonk.de> -Роман Донченко <DXDragon[AT]yandex.ru> +Roman Donchenko <DXDragon[AT]yandex.ru> <billyjeans[AT]gmail.com> Evan Huus <eapache[AT]gmail.com> Tom Cook <tcook[AT]ixiacom.com> ++++++ wireshark-1.10.0-enable_lua.patch ++++++ From: [email protected] References: [bnc#650434] Upstream: never - fix lua error at startup (enable_lua.patch) [bnc#650434] previously named wireshark-1.2.4-enable_lua.patch --- epan/wslua/template-init.lua | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: wireshark-1.10.0rc2/epan/wslua/template-init.lua =================================================================== --- wireshark-1.10.0rc2.orig/epan/wslua/template-init.lua 2013-04-22 19:04:37.000000000 +0100 +++ wireshark-1.10.0rc2/epan/wslua/template-init.lua 2013-05-26 17:43:20.000000000 +0100 @@ -43,7 +43,7 @@ if running_superuser then local disabled_lib = {} setmetatable(disabled_lib,{ __index = function() error("this package ".. hint) end } ); - dofile = function() error("dofile " .. hint) end +-- dofile = function() error("dofile " .. hint) end loadfile = function() error("loadfile " .. hint) end loadlib = function() error("loadlib " .. hint) end require = function() error("require " .. hint) end ++++++ wireshark-1.10.12-fix-wmem-headers.patch ++++++ From: Andreas Stieger <[email protected]> Date: Fri, 09 Jan 2015 23:36:52 +0100 Subject: fix References: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commitdiff;h=074349264e4d3e139ed2622645bdef231b63ede3#patch10 https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob;f=epan/dissectors/packet-dec-dnart.c;h=7488b4ee4fc916d7641d960c4650dd84026d74f5;hb=b5d7b7ab6e6b0e595d3250d7fa6553d0da79c000 Upstream: no Build fails due to incomplete conversion from emem to wmem and parallel header clean-up. [ 215s] packet-dec-dnart.c: In function 'set_dnet_address': [ 215s] packet-dec-dnart.c:360:13: warning: implicit declaration of function 'wmem_strdup' [-Wimplicit-function-declaration] [ 215s] SET_ADDRESS(paddr_tgt, AT_STRINGZ, 1, [ 215s] ^ [ 215s] In file included from ../../epan/packet_info.h:30:0, [ 215s] from ../../epan/to_str.h:32, [ 215s] from ../../epan/packet.h:32, [ 215s] from packet-dec-dnart.c:53: [ 215s] ../../epan/address.h:73:15: warning: assignment makes pointer from integer without a cast [enabled by default] [ 215s] (addr)->data = (addr_data); \ [ 215s] ^ [ 215s] packet-dec-dnart.c:360:13: note: in expansion of macro 'SET_ADDRESS' [ 215s] SET_ADDRESS(paddr_tgt, AT_STRINGZ, 1, [ 215s] ^ [...] E: wireshark 64bit-portability-issue ../../epan/address.h:73 Index: wireshark-1.10.12/epan/dissectors/packet-dec-dnart.c =================================================================== --- wireshark-1.10.12.orig/epan/dissectors/packet-dec-dnart.c +++ wireshark-1.10.12/epan/dissectors/packet-dec-dnart.c @@ -52,6 +52,7 @@ #include <glib.h> #include <epan/packet.h> #include <epan/emem.h> +#include <epan/wmem/wmem.h> #include <epan/etypes.h> #include <epan/ppptypes.h> ++++++ wireshark-1.2.0-disable-warning-dialog.patch ++++++ Index: ui/gtk/main.c =================================================================== --- ui/gtk/main.c.orig 2012-08-10 01:35:00.000000000 +0100 +++ ui/gtk/main.c 2012-08-15 20:28:59.000000000 +0100 @@ -1399,11 +1399,13 @@ main_colorize_changed(gboolean packet_li static GtkWidget *close_dlg = NULL; +/* static void priv_warning_dialog_cb(gpointer dialog, gint btn _U_, gpointer data _U_) { recent.privs_warn_if_elevated = !simple_dialog_check_get(dialog); } +*/ #ifdef _WIN32 static void @@ -2081,9 +2083,10 @@ check_and_warn_user_startup(gchar *cf_na #endif { gchar *cur_user, *cur_group; - gpointer priv_warning_dialog; +// gpointer priv_warning_dialog; /* Tell the user not to run as root. */ +/* if (running_with_special_privs() && recent.privs_warn_if_elevated) { cur_user = get_cur_username(); cur_group = get_cur_groupname(); @@ -2098,6 +2101,7 @@ check_and_warn_user_startup(gchar *cf_na simple_dialog_check_set(priv_warning_dialog, "Don't show this message again."); simple_dialog_set_cb(priv_warning_dialog, priv_warning_dialog_cb, NULL); } +*/ #ifdef _WIN32 /* Warn the user if npf.sys isn't loaded. */ ++++++ wireshark-1.2.0-geoip.patch ++++++ Index: epan/geoip_db.c =================================================================== --- epan/geoip_db.c.orig 2012-06-05 17:33:40.000000000 +0100 +++ epan/geoip_db.c 2012-06-21 21:55:14.000000000 +0100 @@ -177,6 +177,9 @@ geoip_db_init(void) { geoip_dat_scan_dir(geoip_db_paths[i].path); } } + if (num_geoip_db_paths < 1) { + geoip_dat_scan_dir("/var/lib/GeoIP"); + } /* add fake databases for latitude and longitude (using "City" in reality) */ {
