Subject: CVS commit: [pkgsrc-2013Q2] pkgsrc/net/wireshark
From: S.P.Zeidler
Date: 2013-09-18 11:55:31
Message id: 20130918095531.7C35B96@cvs.netbsd.org

Log Message:
Pullup ticket #4232 - requested by tron
net/wireshark: security update

Revisions pulled up:
- net/wireshark/Makefile	by patch
- net/wireshark/distinfo	by patch

-------------------------------------------------------------------
   Update "wireshark" package to version 1.8.10. Changes since 1.8.9:
   - Bug Fixes
     The following vulnerabilities have been fixed.
     o wnpa-sec-2013-55
       The NBAP dissector could crash. Discovered by Laurent Butti.
       (Bug 9005)
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
     o wnpa-sec-2013-56
       The ASSA R3 dissector could go into an infinite loop.
       Discovered by Ben Schmidt. (Bug 9020 )
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
     o wnpa-sec-2013-57
       The RTPS dissector could overflow a buffer. Discovered by Ben
       Schmidt. (Bug 9019 )
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
     o wnpa-sec-2013-58
       The MQ dissector could crash. (Bug 9079 )
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
     o wnpa-sec-2013-59
       The LDAP dissector could crash.
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
     o wnpa-sec-2013-60
       The Netmon file parser could crash. Discovered by G. Geshev.
       (Bug 8742 )
       Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
   - The following bugs have been fixed:
     o Lua ByteArray:append() causes wireshark crash. (Bug 4461)
     o Lua script can not get "data-text-lines" protocol data. (Bug
       5200)
     o PER normally small non-negative whole number decoding is wrong
       when >= 64. (Bug 8841)
     o Incorrect parsing of IPFIX *IpTotalLength elements. (Bug 8918)
     o IO graph/advanced, max/min/summ error on frames with multiple
       Diameter messages. (Bug 8980)
     o Wireshark fails to decode single-line, multiple Contact: URIs
       in SIP responses. (Bug 9031)
     o Dissector for EtherCAT: ADS highlighting in the Packet Bytes
       Pane is incorrect. (Bug 9036)
     o 802.11 HT Extended Capabilities B10 decode incorrect. (Bug
       9038)
     o Weird malformed HTTP error. (Bug 9101)
   - Updated Protocol Support
     ASSA R3, EtherCAT AMS, GTPv2, HTTP, IEEE 802.11, IPFIX, LDAP, MQ,
     NBAP, NCP SSS, RTPS, SIP,

Files:
RevisionActionfile
1.103.2.2modifypkgsrc/net/wireshark/Makefile
1.66.2.2modifypkgsrc/net/wireshark/distinfo