Path to this page:
Subject: CVS commit: [pkgsrc-2013Q2] pkgsrc/net/wireshark
From: S.P.Zeidler
Date: 2013-09-18 11:55:31
Message id: 20130918095531.7C35B96@cvs.netbsd.org
Log Message:
Pullup ticket #4232 - requested by tron
net/wireshark: security update
Revisions pulled up:
- net/wireshark/Makefile by patch
- net/wireshark/distinfo by patch
-------------------------------------------------------------------
Update "wireshark" package to version 1.8.10. Changes since 1.8.9:
- Bug Fixes
The following vulnerabilities have been fixed.
o wnpa-sec-2013-55
The NBAP dissector could crash. Discovered by Laurent Butti.
(Bug 9005)
Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
o wnpa-sec-2013-56
The ASSA R3 dissector could go into an infinite loop.
Discovered by Ben Schmidt. (Bug 9020 )
Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
o wnpa-sec-2013-57
The RTPS dissector could overflow a buffer. Discovered by Ben
Schmidt. (Bug 9019 )
Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
o wnpa-sec-2013-58
The MQ dissector could crash. (Bug 9079 )
Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
o wnpa-sec-2013-59
The LDAP dissector could crash.
Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
o wnpa-sec-2013-60
The Netmon file parser could crash. Discovered by G. Geshev.
(Bug 8742 )
Versions affected: 1.10.0 to 1.10.1, 1.8.0 to 1.8.9.
- The following bugs have been fixed:
o Lua ByteArray:append() causes wireshark crash. (Bug 4461)
o Lua script can not get "data-text-lines" protocol data. (Bug
5200)
o PER normally small non-negative whole number decoding is wrong
when >= 64. (Bug 8841)
o Incorrect parsing of IPFIX *IpTotalLength elements. (Bug 8918)
o IO graph/advanced, max/min/summ error on frames with multiple
Diameter messages. (Bug 8980)
o Wireshark fails to decode single-line, multiple Contact: URIs
in SIP responses. (Bug 9031)
o Dissector for EtherCAT: ADS highlighting in the Packet Bytes
Pane is incorrect. (Bug 9036)
o 802.11 HT Extended Capabilities B10 decode incorrect. (Bug
9038)
o Weird malformed HTTP error. (Bug 9101)
- Updated Protocol Support
ASSA R3, EtherCAT AMS, GTPv2, HTTP, IEEE 802.11, IPFIX, LDAP, MQ,
NBAP, NCP SSS, RTPS, SIP,
Files: