Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-1.9.git;a=commitdiff;h=bf9b9b3efee9433ca0a6e9d3b015f1a713896733
commit bf9b9b3efee9433ca0a6e9d3b015f1a713896733 Author: kikadf <[email protected]> Date: Wed Aug 20 17:05:14 2014 +0200 wireshark-1.8.15-1arcturus1-x86_64 * Version bump * Fix CVE-2014-5161, CVE-2014-5162, CVE-2014-5163, CVE-2014-5164, * CVE-2014-5165 diff --git a/source/xapps-extra/wireshark/CVE-2014-5161-5162.patch b/source/xapps-extra/wireshark/CVE-2014-5161-5162.patch new file mode 100644 index 0000000..4dcce72 --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-5161-5162.patch @@ -0,0 +1,57 @@ +From a2f977dd56442e2741425481309f4ee1994b8ac3 Mon Sep 17 00:00:00 2001 +From: Peter Wu <[email protected]> +Date: Thu, 3 Jul 2014 11:25:21 +0200 +Subject: [PATCH 1/4] catapult,irda: Fix ASAN crashes due to buffer underrun + +The catapult dissector tripped on this random file I had. A quick look +at other dissectors which use a construct like "-1] *= '*\\[rn]" showed +packet-irda too, so fix that as well. + +Conflicts: + wiretap/catapult_dct2000.c + +Change-Id: I4b5fadcacd0b09d0fb29bdefc3dd1f28aef9b593 +Reviewed-on: https://code.wireshark.org/review/2802 +Reviewed-by: Evan Huus <[email protected]> +Reviewed-by: Michael Mann <[email protected]> +(cherry picked from commit 16f8ba1bed579344df373bf38fff552ab8baf380) +Reviewed-on: https://code.wireshark.org/review/2810 +Reviewed-on: https://code.wireshark.org/review/3437 +Reviewed-by: Balint Reczey <[email protected]> +--- + plugins/irda/packet-irda.c | 4 ++-- + wiretap/catapult_dct2000.c | 2 +- + 2 files changed, 3 insertions(+), 3 deletions(-) + +diff --git a/plugins/irda/packet-irda.c b/plugins/irda/packet-irda.c +index 395deda..cbc9507 100644 +--- a/plugins/irda/packet-irda.c ++++ b/plugins/irda/packet-irda.c +@@ -1656,9 +1656,9 @@ static void dissect_log(tvbuff_t* tvb, packet_info* pinfo, proto_tree* root) + length = sizeof(buf)-1; + tvb_memcpy(tvb, buf, 0, length); + buf[length] = 0; +- if (buf[length-1] == '\n') ++ if (length > 0 && buf[length-1] == '\n') + buf[length-1] = 0; +- else if (buf[length-2] == '\n') ++ else if (length > 1 && buf[length-2] == '\n') + buf[length-2] = 0; + + col_add_str(pinfo->cinfo, COL_INFO, buf); +diff --git a/wiretap/catapult_dct2000.c b/wiretap/catapult_dct2000.c +index 02198ee..a524b86 100644 +--- a/wiretap/catapult_dct2000.c ++++ b/wiretap/catapult_dct2000.c +@@ -809,7 +809,7 @@ read_new_line(FILE_T fh, gint64 *offset, gint *length, + *offset = *offset + *length; + + /* ...but don't want to include newline in line length */ +- if (linebuff[*length-1] == '\n') { ++ if (*length > 0 && linebuff[*length-1] == '\n') { + linebuff[*length-1] = '\0'; + *length = *length - 1; + } +-- +2.0.1 + diff --git a/source/xapps-extra/wireshark/CVE-2014-5163.patch b/source/xapps-extra/wireshark/CVE-2014-5163.patch new file mode 100644 index 0000000..c7a2b5f --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-5163.patch @@ -0,0 +1,35 @@ +From 3b3c845f5c0383f3db48e610d711db48b317da1c Mon Sep 17 00:00:00 2001 +From: Pascal Quantin <[email protected]> +Date: Mon, 23 Jun 2014 22:06:05 +0200 +Subject: [PATCH 4/4] Initialize whole buffer in GPRS Mobility and Session + Management dissector + +Bug: 10216 +Change-Id: I572a7a6ce0f816063f02397b667dd46c990cf73e +Reviewed-on: https://code.wireshark.org/review/2583 +Reviewed-by: Pascal Quantin <[email protected]> +(cherry picked from commit dd7134d907350ccc574cdec596f4162860912bb9) +Reviewed-on: https://code.wireshark.org/review/2585 +(cherry picked from commit abae269b462b0b39fda7a21b24a53d0033662662) +Reviewed-on: https://code.wireshark.org/review/3436 +Reviewed-by: Balint Reczey <[email protected]> +--- + epan/dissectors/packet-gsm_a_gm.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/epan/dissectors/packet-gsm_a_gm.c b/epan/dissectors/packet-gsm_a_gm.c +index 6517aec..1b09d53 100644 +--- a/epan/dissectors/packet-gsm_a_gm.c ++++ b/epan/dissectors/packet-gsm_a_gm.c +@@ -3746,7 +3746,7 @@ de_sm_apn(tvbuff_t *tvb, proto_tree *tree, packet_info *pinfo, guint32 offset, g + curr_offset = offset; + + /* init buffer and copy it */ +- memset(str, 0, MAX_APN_LENGTH); ++ memset(str, 0, MAX_APN_LENGTH+1); + tvb_memcpy(tvb, str, offset, len<MAX_APN_LENGTH?len:MAX_APN_LENGTH); + + curr_len = 0; +-- +2.0.1 + diff --git a/source/xapps-extra/wireshark/CVE-2014-5164.patch b/source/xapps-extra/wireshark/CVE-2014-5164.patch new file mode 100644 index 0000000..1f67cb1 --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-5164.patch @@ -0,0 +1,46 @@ +From 0047b5d36ae50af7a703c7d9a4cf979dd6e746e5 Mon Sep 17 00:00:00 2001 +From: Evan Huus <[email protected]> +Date: Tue, 17 Jun 2014 21:43:49 +0000 +Subject: [PATCH 3/4] Set the rlc len field before we try to use it in an + expert info. + +Conflicts: + epan/dissectors/packet-rlc.c + +Bug:9795 +Change-Id: I740a9fe36278995cf6e590206f600c037789f0eb +Reviewed-on: https://code.wireshark.org/review/2344 +Reviewed-by: Evan Huus <[email protected]> +(cherry picked from commit ba6eb5c72ffe82ca0e51c7083240975a5b118ad2) +Reviewed-on: https://code.wireshark.org/review/2345 +(cherry picked from commit 2c877e0c77be47f5ac78b8f307081b5e4f36b2be) +Reviewed-on: https://code.wireshark.org/review/2346 +Reviewed-on: https://code.wireshark.org/review/3439 +Reviewed-by: Balint Reczey <[email protected]> +--- + epan/dissectors/packet-rlc.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/epan/dissectors/packet-rlc.c b/epan/dissectors/packet-rlc.c +index 1045b83..0cb5d6f 100644 +--- a/epan/dissectors/packet-rlc.c ++++ b/epan/dissectors/packet-rlc.c +@@ -1156,6 +1156,7 @@ rlc_decode_li(enum rlc_mode mode, tvbuff_t *tvb, packet_info *pinfo, proto_tree + * may not be larger than the total remaining length and no + * LI may be smaller than its preceding one + */ ++ li[num_li].len = li[num_li].li - prev_li; + if (((li[num_li].li > total_len) && !global_rlc_headers_expected) + || (li[num_li].li < prev_li)) { + /* add malformed LI for investigation */ +@@ -1167,7 +1168,6 @@ rlc_decode_li(enum rlc_mode mode, tvbuff_t *tvb, packet_info *pinfo, proto_tree + col_append_str(pinfo->cinfo, COL_INFO, "[Malformed Packet]"); + return -1; /* just give up on this */ + } +- li[num_li].len = li[num_li].li - prev_li; + prev_li = li[num_li].li; + } + } +-- +2.0.1 + diff --git a/source/xapps-extra/wireshark/CVE-2014-5165.patch b/source/xapps-extra/wireshark/CVE-2014-5165.patch new file mode 100644 index 0000000..14f75c1 --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-5165.patch @@ -0,0 +1,37 @@ +From e13dd1c8d17aa3460cf751cddaa1c6d982af60a6 Mon Sep 17 00:00:00 2001 +From: Evan Huus <[email protected]> +Date: Tue, 17 Jun 2014 18:13:51 +0000 +Subject: [PATCH 2/4] fix underflow in BER constrained bitstrings + +this can happen and cause invalid memory accesses with incorrectly-large padding +values + +Conflicts: + epan/dissectors/packet-ber.c + +Bug:10187 +Change-Id: Ib9b2a2fa10766efb4d95d588f57354a56373c626 +Reviewed-on: https://code.wireshark.org/review/2328 +Reviewed-by: Evan Huus <[email protected]> +Reviewed-on: https://code.wireshark.org/review/3438 +Reviewed-by: Balint Reczey <[email protected]> +--- + epan/dissectors/packet-ber.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/epan/dissectors/packet-ber.c b/epan/dissectors/packet-ber.c +index fd1cf5b..727647b 100644 +--- a/epan/dissectors/packet-ber.c ++++ b/epan/dissectors/packet-ber.c +@@ -4459,7 +4459,7 @@ int dissect_ber_constrained_bitstring(gboolean implicit_tag, asn1_ctx_t *actx, p + bitstring = tvb_get_ephemeral_string(tvb, offset, len); + + while (nb->p_id) { +- if(len > 0 && nb->bit < (8*len-pad)) { ++ if ((len > 0) && (pad < 8*len) && (nb->bit < (8*len-pad))) { + val = tvb_get_guint8(tvb, offset + nb->bit/8); + bitstring[(nb->bit/8)] &= ~(0x80 >> (nb->bit%8)); + val &= 0x80 >> (nb->bit%8); +-- +2.0.1 + diff --git a/source/xapps-extra/wireshark/FrugalBuild b/source/xapps-extra/wireshark/FrugalBuild index 4af85dd..fccfe37 100644 --- a/source/xapps-extra/wireshark/FrugalBuild +++ b/source/xapps-extra/wireshark/FrugalBuild @@ -4,7 +4,7 @@ options+=('asneeded') pkgname=wireshark -pkgver=1.8.13 +pkgver=1.8.15 pkgrel=1arcturus1 pkgdesc="The world's most popular network protocol analyzer" url="http://www.wireshark.org/" @@ -18,10 +18,20 @@ _F_gnome_desktop="y" Finclude gnome-scriptlet up2date="lynx -dump http://www.wireshark.org/download.html | grep stable -m1 | sed 's/.*is \(.*\)\. .*/\1/'" source=(http://www.wireshark.org/download/src/$pkgname-$pkgver.tar.bz2) -sha1sums=('ac2215ed2d97c344f3fdf0d365b3791f89aa0564') +sha1sums=('0c5d87db77acb4508819d4d5d3674265a7444f49') ## TODO: split GUI / utils +# FSA fix *** +source=(${source[@]} CVE-2014-5161-5162.patch CVE-2014-5163.patch + CVE-2014-5164.patch CVE-2014-5165.patch) +sha1sums=(${sha1sums[@]} 'c6041fcb35ce7bda66f4185f37d4ec44d5b8861b' \ + 'f0894ed02dd2c165dd5af72db14ac8dede1ae9d6' \ + '5b53305699847d21bd21991639756d1a932043cf' \ + '29d9cfb8f381fe85374168f1c48e7a8716da7443') +# *********** + + build() { Fbuild --with-ssl _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
