Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-1.9.git;a=commitdiff;h=200681131f1aa8a16c5b59f7ba34253162eb2799
commit 200681131f1aa8a16c5b59f7ba34253162eb2799 Author: kikadf <[email protected]> Date: Sat Nov 29 13:56:11 2014 +0100 wireshark-1.8.15-1arcturus2-x86_64 * Fix CVE-2014-8710, CVE-2014-8711, CVE-2014-8712, CVE-2014-8713, * CVE-2014-8714 diff --git a/source/xapps-extra/wireshark/CVE-2014-8710.patch b/source/xapps-extra/wireshark/CVE-2014-8710.patch new file mode 100644 index 0000000..a55494e --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-8710.patch @@ -0,0 +1,43 @@ +From 63b971cd752ac9cdb48d297a48e86851ef7e4ac1 Mon Sep 17 00:00:00 2001 +From: Evan Huus <[email protected]> +Date: Tue, 4 Nov 2014 21:31:17 -0500 +Subject: [PATCH 4/5] sigcomp-udvm: fix invalid access + +Way back in 2006, svn r20041 (now gd408f2f6fc) worked around a problem by +limiting the amount of buffer dealt with in the udvm_state_access call (changing +it from state_minimum_access_length_buff[n] to STATE_MIN_ACCESS_LEN). + +The very next line however, tries to read the same amount of buffer to display +to the user - since it seems nobody ever applied a proper fix for the original +case, just apply the same workaround to the second call. + +Conflicts: + epan/sigcomp-udvm.c + +Bug: 10662 +Change-Id: I32c81ee2a8eb7b30ff7ab1fbbb6ea5f206385d4b +Reviewed-on: https://code.wireshark.org/review/5125 +Reviewed-by: Evan Huus <[email protected]> +Reviewed-on: https://code.wireshark.org/review/5331 +Reviewed-by: Michael Mann <[email protected]> +Reviewed-on: https://code.wireshark.org/review/5355 +--- + epan/sigcomp-udvm.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/epan/sigcomp-udvm.c b/epan/sigcomp-udvm.c +index dc5cfdb..929234f 100644 +--- a/epan/sigcomp-udvm.c ++++ b/epan/sigcomp-udvm.c +@@ -2707,7 +2707,7 @@ execute_next_instruction: + udvm_state_create(sha1buff, sha1_digest_buf, STATE_MIN_ACCESS_LEN); + /* end partial state-id change [email protected] */ + proto_tree_add_text(udvm_tree,bytecode_tvb, 0, -1,"### Creating state ###"); +- proto_tree_add_string(udvm_tree,hf_id, bytecode_tvb, 0, 0, bytes_to_str(sha1_digest_buf, state_minimum_access_length_buff[n])); ++ proto_tree_add_string(udvm_tree,hf_id, bytecode_tvb, 0, 0, bytes_to_str(sha1_digest_buf, STATE_MIN_ACCESS_LEN)); + + n++; + +-- +2.1.3 + diff --git a/source/xapps-extra/wireshark/CVE-2014-8711.patch b/source/xapps-extra/wireshark/CVE-2014-8711.patch new file mode 100644 index 0000000..1276e1e --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-8711.patch @@ -0,0 +1,51 @@ +From f18ced8f1da11e1760b85726b0890457223c768d Mon Sep 17 00:00:00 2001 +From: Bill Meier <[email protected]> +Date: Sun, 19 Oct 2014 10:04:39 -0400 +Subject: [PATCH 5/5] packet-amqp.c: Temporary/preliminary fix for Bug #10582 + (crash) + +This is a temporary/preliminary fix to prevent the buildbot fuzz-test + failures seen when testing the capture file attached to Bug #10582. + +As noted in the bug, a complete fix will require some reworking of + the amqp dissector. + +Change-Id: I2571f1eeb46a7eede04b8d809e87b95f1ff529df +Reviewed-on: https://code.wireshark.org/review/4835 +Reviewed-by: Bill Meier <[email protected]> +(cherry picked from commit 8def8ef9c40189472a46d9b1ad95289780e09af5) +Reviewed-on: https://code.wireshark.org/review/4837 +Reviewed-by: Evan Huus <[email protected]> +Reviewed-on: https://code.wireshark.org/review/5356 +--- + epan/dissectors/packet-amqp.c | 10 ++++++++++ + 1 file changed, 10 insertions(+) + +diff --git a/epan/dissectors/packet-amqp.c b/epan/dissectors/packet-amqp.c +index 3d42d0a..9c610a9 100644 +--- a/epan/dissectors/packet-amqp.c ++++ b/epan/dissectors/packet-amqp.c +@@ -53,10 +53,20 @@ static int amqp_port = 5672; + + /* Generic defines */ + ++#if 0 + #define AMQP_INCREMENT(offset, addend, bound) {\ + offset += (addend);\ + THROW_ON((offset > bound), ReportedBoundsError); \ + } ++#else /* --> (temporary until in-progress code review completed; See Bug #10582) */ ++#define AMQP_INCREMENT(offset, addend, bound) {\ ++ THROW_ON( \ ++ (((unsigned)(offset) + (unsigned)(addend)) < (unsigned)(offset)) || \ ++ (((unsigned)(offset) + (unsigned)(addend)) > (unsigned)(bound )) \ ++ , ReportedBoundsError); \ ++ offset += (addend); \ ++} ++#endif + + /* + * This dissector handles AMQP 0-9 and 0-10. The conversation structure +-- +2.1.3 + diff --git a/source/xapps-extra/wireshark/CVE-2014-8712.patch b/source/xapps-extra/wireshark/CVE-2014-8712.patch new file mode 100644 index 0000000..aef47a6 --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-8712.patch @@ -0,0 +1,38 @@ +From 4028d5ba2714f7270190f8f86ead2412975fc878 Mon Sep 17 00:00:00 2001 +From: Evan Huus <[email protected]> +Date: Sat, 25 Oct 2014 14:08:57 -0400 +Subject: [PATCH 2/5] ncp2222: initialize buffer in build_expert_data + +We do a bunch of conditional logic to fill in the buffer, and then were checking +strlen(buffer) to see if we'd actually filled it in or not, but if we hadn't +then the buffer was garbage and strlen(buffer) was throwing valgrind warnings. +Ensure this works as intended by setting the first byte of the buffer +unconditionally at the beginning, so strlen(buffer) returns 0 as expected in +that case. + +Bug: 10628 +Change-Id: I6f6c29fbbcb601b6ebccb3a4b312f0fa72c169ae +Reviewed-on: https://code.wireshark.org/review/4925 +Reviewed-by: Evan Huus <[email protected]> +(cherry picked from commit b726d17816e0af213a554b6b4138e432ac002dd8) +Reviewed-on: https://code.wireshark.org/review/5353 +Reviewed-by: Balint Reczey <[email protected]> +--- + epan/dissectors/packet-ncp2222.inc | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/epan/dissectors/packet-ncp2222.inc b/epan/dissectors/packet-ncp2222.inc +index 79f8fa4..176248d 100644 +--- a/epan/dissectors/packet-ncp2222.inc ++++ b/epan/dissectors/packet-ncp2222.inc +@@ -2686,6 +2686,7 @@ build_expert_data(proto_tree *ncp_tree, const char *hf_name, char *buffer, + char temp_buffer[256]="\0"; + gboolean in_struct=FALSE; + ++ buffer[0] = '\0'; + tree_loc = ncp_tree->first_child; + for (tree_pointer=tree_loc; tree_pointer!=NULL; tree_pointer=tree_pointer->next) + { +-- +2.1.3 + diff --git a/source/xapps-extra/wireshark/CVE-2014-8713.patch b/source/xapps-extra/wireshark/CVE-2014-8713.patch new file mode 100644 index 0000000..78900e9 --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-8713.patch @@ -0,0 +1,42 @@ +From b75179a7c392a134801bf988b1b2d7400d4670b4 Mon Sep 17 00:00:00 2001 +From: Evan Huus <[email protected]> +Date: Mon, 13 Oct 2014 12:55:40 -0400 +Subject: [PATCH 3/5] ncp2222: don't overflow buffer constructing string + +Fixes stack-smashing vuln. + +Somehow there was already an XXX in the code about this, but nobody realized at +the time it was worth fixing... really? + +Bug: 10552 +Change-Id: I849068bd6c45146339444f295b72430d3c6e08f2 +Reviewed-on: https://code.wireshark.org/review/4653 +Reviewed-by: Evan Huus <[email protected]> +(cherry picked from commit b9988e2bbfc7c6c41ef82c559bd11a8c19170491) +Reviewed-on: https://code.wireshark.org/review/4654 +Reviewed-on: https://code.wireshark.org/review/5336 +Reviewed-by: Michael Mann <[email protected]> +(cherry picked from commit 6b8c5dba634cde2fe95fca81668337380f19d641) +Reviewed-on: https://code.wireshark.org/review/5354 +Reviewed-by: Balint Reczey <[email protected]> +--- + epan/dissectors/packet-ncp2222.inc | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/epan/dissectors/packet-ncp2222.inc b/epan/dissectors/packet-ncp2222.inc +index 176248d..38559ae 100644 +--- a/epan/dissectors/packet-ncp2222.inc ++++ b/epan/dissectors/packet-ncp2222.inc +@@ -2712,8 +2712,7 @@ build_expert_data(proto_tree *ncp_tree, const char *hf_name, char *buffer, + case 18: + case 19: + case 20: /* string */ +- /* XXX: Should we verify: buffer_size is as large as value returned by get_finfo_length(...) ??? */ +- uni_to_string(get_finfo_value_string(PTREE_FINFO(tree_pointer)), get_finfo_length(PTREE_FINFO(tree_pointer)), buffer); ++ uni_to_string(get_finfo_value_string(PTREE_FINFO(tree_pointer)), MIN(get_finfo_length(PTREE_FINFO(tree_pointer)), buffer_size), buffer); + if (repeat_lookup > 0) { + if (strlen(temp_buffer) + strlen(buffer) < 250) { + g_strlcat(temp_buffer, buffer, 256); +-- +2.1.3 + diff --git a/source/xapps-extra/wireshark/CVE-2014-8714.patch b/source/xapps-extra/wireshark/CVE-2014-8714.patch new file mode 100644 index 0000000..5430ac0 --- /dev/null +++ b/source/xapps-extra/wireshark/CVE-2014-8714.patch @@ -0,0 +1,37 @@ +From 170b5630c94189bac0665dc1161057f6de937c68 Mon Sep 17 00:00:00 2001 +From: Martin Kaiser <[email protected]> +Date: Mon, 20 Oct 2014 22:37:51 +0200 +Subject: [PATCH 1/5] tn5250: fix an endless loop, exit when offset is not + incremented + +Bug: 10596 +Change-Id: I64509aa49fce4893dee4e7a74a560e09a98830f6 +Reviewed-on: https://code.wireshark.org/review/4878 +Reviewed-by: Martin Kaiser <[email protected]> +Tested-by: Martin Kaiser <[email protected]> +(cherry picked from commit bc2726578156f3608960fc65ce1f691639e6addc) +Reviewed-on: https://code.wireshark.org/review/4879 +Reviewed-by: Evan Huus <[email protected]> +(cherry picked from commit fad4ecce54ac890117ab94e804b9689695b28be9) +Reviewed-on: https://code.wireshark.org/review/5352 +Reviewed-by: Balint Reczey <[email protected]> +--- + epan/dissectors/packet-tn5250.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/epan/dissectors/packet-tn5250.c b/epan/dissectors/packet-tn5250.c +index 2a041e4..347759c 100644 +--- a/epan/dissectors/packet-tn5250.c ++++ b/epan/dissectors/packet-tn5250.c +@@ -4647,6 +4647,8 @@ dissect_write_structured_field(proto_tree *tn5250_tree, tvbuff_t *tvb, gint offs + length = tvb_get_guint8(tvb,offset); + proto_tree_add_item(tn5250_tree, hf_tn5250_length, tvb, offset, + 1, ENC_BIG_ENDIAN); ++ if (length==0) ++ break; + proto_tree_add_item(tn5250_tree, hf_tn5250_dpt_ec, tvb, offset, + length, ENC_EBCDIC|ENC_NA); + offset += length; +-- +2.1.3 + diff --git a/source/xapps-extra/wireshark/FrugalBuild b/source/xapps-extra/wireshark/FrugalBuild index fccfe37..ed95cff 100644 --- a/source/xapps-extra/wireshark/FrugalBuild +++ b/source/xapps-extra/wireshark/FrugalBuild @@ -5,7 +5,7 @@ options+=('asneeded') pkgname=wireshark pkgver=1.8.15 -pkgrel=1arcturus1 +pkgrel=1arcturus2 pkgdesc="The world's most popular network protocol analyzer" url="http://www.wireshark.org/" depends=('libkrb5' 'gtk+2>=2.20.0-2' 'libpcap' 'gnutls>=2.12.12' 'openssl>=1.0.0') @@ -17,18 +17,25 @@ _F_gnome_iconcache="y" _F_gnome_desktop="y" Finclude gnome-scriptlet up2date="lynx -dump http://www.wireshark.org/download.html | grep stable -m1 | sed 's/.*is \(.*\)\. .*/\1/'" -source=(http://www.wireshark.org/download/src/$pkgname-$pkgver.tar.bz2) +source=(http://www.wireshark.org/download/src//all-versions/$pkgname-$pkgver.tar.bz2) sha1sums=('0c5d87db77acb4508819d4d5d3674265a7444f49') ## TODO: split GUI / utils # FSA fix *** source=(${source[@]} CVE-2014-5161-5162.patch CVE-2014-5163.patch - CVE-2014-5164.patch CVE-2014-5165.patch) + CVE-2014-5164.patch CVE-2014-5165.patch CVE-2014-8710.patch + CVE-2014-8711.patch CVE-2014-8712.patch CVE-2014-8713.patch + CVE-2014-8714.patch) sha1sums=(${sha1sums[@]} 'c6041fcb35ce7bda66f4185f37d4ec44d5b8861b' \ 'f0894ed02dd2c165dd5af72db14ac8dede1ae9d6' \ '5b53305699847d21bd21991639756d1a932043cf' \ - '29d9cfb8f381fe85374168f1c48e7a8716da7443') + '29d9cfb8f381fe85374168f1c48e7a8716da7443' \ + '6e1a14a5e48bb3b5e9629c6ff7a2f01902fd683b' \ + 'b54cfe0f961a5bc4dc785f12a5e0246addd8c6d8' \ + '843ad111b868ddf2e7e3b7cf1fa477e8ddd01225' \ + 'f2bad25d4e1e24e9906f98a9c1eff0a6c4629980' \ + '311ce10f11d07d163e0e3f3d302f1159c4dd21e8') # *********** _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
