Path to this page:
Subject: CVS commit: pkgsrc/net/wireshark
From: Thomas Klausner
Date: 2018-12-02 10:06:20
Message id: 20181202090620.8A739FB1F@cvs.NetBSD.org
Log Message:
wireshark: update to 2.6.4.
Wireshark 2.6.4 Release Notes
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2018-47[1]
• MS-WSP dissector crash. Bug 15119[2]. CVE-2018-18227[3].
• wnpa-sec-2018-48[4]
• Steam IHS Discovery dissector memory leak. Bug 15171[5].
CVE-2018-18226[6].
• wnpa-sec-2018-49[7]
• CoAP dissector crash. Bug 15172[8]. CVE-2018-18225[9].
• wnpa-sec-2018-50[10]
• OpcUA dissector crash. CVE-2018-12086[11].
The following bugs have been fixed:
• HTTP2 dissector decodes first SSL record only. Bug 11173[12].
• Undocumented sub-option for -N option in man page and tshark -N
help. Bug 14826[13].
• Mishandling of Port Control Protocol option padding. Bug
14950[14].
• MGCP: parameter lines are case-insensitive. Bug 15008[15].
• Details of 2nd sub-VSA in bundled RADIUS VSA are incorrect. Bug
15073[16].
• Heuristic DPLAY dissector fails to recognize DPLAY packets. Bug
15092[17].
• gsm_rlcmac_dl dissector exception. Bug 15112[18].
• dfilter_buttons file under user-created profile. Bug 15114[19].
• Filter buttons disappear when using pre-2.6 profile. Bug
15121[20].
• PROFINET Information element AM_DeviceIdentification in Asset
Management Info block is decoded wrongly. Bug 15140[21].
• Hw dest addr column shows incorrect address. Bug 15144[22].
• Windows dumpcap -i TCP@<ip-address> fails on pcapng stream. Bug
15149[23].
• Wildcard expansion doesn’t work on Windows 10 for command-line
programs in cmd.exe or PowerShell. Bug 15151[24].
• SSL Reassembly Error New fragment past old data limits. Bug
15158[25].
Updated Protocol Support
ASN.1 PER, Bluetooth HCI_SCO, CoAP, DPLAY, IEEE 802.11, Kafka,
Message Analyzer, MGCP, MS-WSP, Netmon, OpcUa, PCP, PNIO, RADIUS,
Steam IHS Discovery, and TLS
Files: