|
|
|
|
Changelog for wireshark-4.4.1-472.3.i586.rpm :
* Thu Oct 10 2024 Robert Frohl - Wireshark 4.4.1 * CVE-2024-9780: ITS dissector crash (boo#1231475). * CVE-2024-9781: AppleTalk and RELOAD Framing dissector crashes (boo#1231476).- Many more features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.4.1.html * Fri Aug 30 2024 Robert Frohl - Wireshark 4.4.0 * Many improvements and fixes to the graphing dialogs, including I/O Graphs, Flow Graph / VoIP Calls, and TCP Stream Graphs * Custom columns can be defined using any valid field expression, such as display filter functions, packet slices, arithmetic calculations, logical tests, raw byte addressing, and protocol layer modifiers * Wireshark now supports automatic profile switching. You can associate a display filter with a configuration profile, and when you open a capture file that matches the filter, Wireshark will automatically switch to that profile. * Improved display filter support for value strings (optional string representations for numeric fields).- Many more features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.4.0.html- drop wireshark-0000-wsutil-implicit_declaration_memcpy.patch: included upstream- update wireshark-0010-dumpcap-permission-denied.patch * Thu Aug 29 2024 Robert Frohl - Wireshark 4.2.7: * CVE-2024-8250: NTLMSSP dissector crash (boo#1229907).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.7.html * Wed Jul 10 2024 Robert Frohl - Wireshark 4.2.6 (jsc#PED-8517): * CVE-2024-8645: SPRT dissector crash (boo#1230372).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.6.html * Wed Jun 19 2024 Markus Ebner - Fix Wireshark Super User Mode starter * Wed May 15 2024 Andreas Stieger - Wireshark 4.2.5: * CVE-2024-4854: MONGO and ZigBee TLV dissector infinite loops (wnpa-sec-2024-07 boo#1224274) * CVE-2024-4853: The editcap command line utility could crash when chopping bytes from the beginning of a packet (wnpa-sec-2024-08 boo#1224259) * CVE-2024-4855: The editcap command line utility could crash when injecting secrets while writing multiple files (wnpa-sec-2024-09 boo#1224276)- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.5.html * Thu Mar 28 2024 Robert Frohl - Wireshark 4.2.4: * CVE-2024-2955: T.38 dissector crash (boo#1222030).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.4.html * Thu Feb 15 2024 Robert Frohl - Wireshark 4.2.3: * Capture start fails when file set enabled and file extension not supplied if directory contains a period. * Cannot drag and move custom filter buttons in toolbar. * Not equal won’t work when used with wlan.addr. * sshdump fails to connect with private key (ssh-rsa) * ChmodBPF installation fails on macOS Sonoma 14.1.2. * Windows installers should check for Windows 8.1. * Fuzz job crash output: fuzz-2024-01-05-7725.pcap. * Fuzz job crash output: fuzz-2024-01-06-7734.pcap. * Incorrect recursion depth assert failure when dissecting a legitimate GOOSE message. * OPC UA - large read request is reported as malformed in 4.2.1 but not in 4.0.12. * TFTP dissector bug type listed as netscii instead of netascii doesn’t show all TFTP packets including TFTP blocks. * SMB1 replies from LAN Drive app only show up as NBSS Continuation Message. * ciscodump - older SSH key exchange algorithms not supported. * Problem decoding LAPB/X.25/FTAM after adding X.75 decoding. * Wireshark Filter not working. * CFLOW: failure to decode 0 length data fields of * Copy ...as Printable Text Feature Missing in 4.1/4.2. * Export Objects - HTTP is missing some HTTP/2 files in a two-pass analysis. * ASAM-CMP Plugin: Malformed message, length mismatch if vendor defined data of status messages has odd length. * OSS-Fuzz 66561: wireshark:fuzzshark_ip_proto-udp: Null-dereference READ in wmem_map_lookup.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.3.html * Mon Feb 12 2024 Dirk Müller - handle one more mismatch in docdir handling * Mon Jan 29 2024 Dirk Müller - handle different CMAKE_INSTALL_DOCDIR setting between tumbleweed and leap * Fri Jan 05 2024 Robert Frohl - Wireshark 4.2.2: * minor bug fix release- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.2.html * Thu Jan 04 2024 Robert Frohl - Wireshark 4.2.1: * CVE-2024-0207: HTTP3 dissector crash (boo#1218503). * CVE-2024-0208: GVCP dissector crash (boo#1218504). * CVE-2024-0209: IEEE 1609.2 dissector crash (boo#1218505). * CVE-2024-0210: Zigbee TLV dissector crash (boo#1218506). * CVE-2024-0211: DOCSIS dissector crash (boo#1218507).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.1.html * Wed Nov 29 2023 Dominique Leuenberger - Install SDK using cmake --install --component Development instead of manually copying. This brings back the .pc file and simplifies the spec file. * Fri Nov 24 2023 Robert Frohl - Wireshark 4.2.0: * CVE-2024-24476: Fixed buffer overflow in ws_manuf_lookup_str() (boo#1220181). * CVE-2022-3725: Fixed integer overflow in the OPUS dissector (boo#1204822). * Packet list sorting has been improved. * Wireshark and TShark are now better about generating valid UTF-8 output. * A new display filter feature for filtering raw bytes has been added. * Display filter autocomplete is smarter about not suggesting invalid syntax. * Tools › MAC Address Blocks can lookup a MAC address in the IEEE OUI registry. * The installation target no longer installs development headers by default. * The Wireshark installation is relocatable on Linux (and other ELF platforms with support for relative RPATHs). * Tools › Browser (SSL Keylog) can launch your web browser with the SSLKEYLOGFILE environment variable set to the appropriate value. * Wireshark now supports the Korean language. * Many other improvements have been made. See the “New and Updated Features” section below for more details.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.2.0.html- Updated patches wireshark-0000-wsutil-implicit_declaration_memcpy.patch wireshark-0010-dumpcap-permission-denied.patch * Thu Nov 16 2023 Robert Frohl - Wireshark 4.0.11: * CVE-2023-6174: SSH dissector crash (boo#1217247). * CVE-2023-6175: NetScreen file parser crash (boo#1217272).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.11.html * Thu Oct 05 2023 Andreas Stieger - Wireshark 4.0.10: * CVE-2023-5371: RTPS dissector memory leak (wnpa-sec-2023-27, boo#1215959) * Fix a number of bugs in protocol parsers, including: * RTP/RFC 4571: Wrong desegmentation/reassembly in RTP over TCP packets * Incorrect bit values and namings in BSS Configuration Report TLV * Wireshark 4.0.9 contained a bug affecting other platforms * Wed Aug 23 2023 Robert Frohl - Wireshark 4.0.8: * CVE-2023-4512: CBOR dissector crash (boo#1214561). * CVE-2023-4511: BT SDP dissector infinite loop (boo#1214560). * CVE-2023-4513: BT SDP dissector memory leak (boo#1214562). * CVE-2023-2906: CP2179 dissector crash (boo#1214652).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.8.html * Thu Jul 13 2023 Robert Frohl - Wireshark 4.0.7: * CVE-2023-3648: Kafka dissector crash (boo#1213319). * CVE-2023-3649: iSCSI dissector crash (boo#1213318).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.7.html * Thu May 25 2023 Robert Frohl - Wireshark 4.0.6: * CVE-2023-2854: BLF file parser crash (boo#1211708). * CVE-2023-2855: Candump log file parser crash (boo#1211703). * CVE-2023-2856: VMS TCPIPtrace file parser crash (boo#1211707). * CVE-2023-2857: BLF file parser crash (boo#1211705). * CVE-2023-2858: NetScaler file parser crash (boo#1211706). * CVE-2023-0666: RTPS dissector crash (boo#1211709). * CVE-2023-0668: IEEE C37.118 Synchrophasor dissector crash (boo#1211710). * CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793). * CVE-2023-2952: XRA dissector infinite loop (boo#1211844). * CVE-2023-0667: MS-MMS: failure to validate packet length (bsc#1212084).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html * Thu Apr 13 2023 Robert Frohl - Wireshark 4.0.5: * CVE-2023-1992: RPCoRDMA dissector crash (boo#1210405). * CVE-2023-1993: LISP dissector large loop (boo#1210404). * CVE-2023-1994: GQUIC dissector crash (boo#1210403).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.5.html * Fri Mar 03 2023 Robert Frohl - Wireshark 4.0.4: * CVE-2023-1161: ISO 15765 and ISO 10681 dissector crash (boo#1208914).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.4.html * Thu Jan 19 2023 Robert Frohl - Wireshark 4.0.3 (boo#1207447): * CVE-2023-0414: EAP dissector crash (boo#1207666). * CVE-2023-0417: NFS dissector memory leak (boo#1207669). * CVE-2023-0413: Dissection engine crash (boo#1207665). * CVE-2023-0416: GNW dissector crash (boo#1207668). * CVE-2023-0415: iSCSI dissector crash (boo#1207667). * CVE-2023-0411: Multiple dissector excessive loops (boo#1207663). * CVE-2023-0412: TIPC dissector crash (boo#1207664).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.3.html * Thu Dec 08 2022 Robert Frohl - Wireshark 4.0.2: * CVE-2022-4345: Multiple dissector infinite loops (boo#1206189). * Kafka dissector memory exhaustion (boo#1206190).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.2.html * Thu Oct 27 2022 Robert Frohl - Wireshark 4.0.1: * Comparing a boolean field against 1 always succeeds on big-endian machines. * Qt: MaxMind GeoIP columns not added to Endpoints table. * Fuzz job crash output: fuzz-2022-10-04-7131.pcap. * The RTP player might not play audio on Windows. * Wireshark 4.0 breaks display filter expression with > sign. * Capture filters not working when using SSH capture and dumpcap. * Packet diagram field values are not terminated. * Packet bytes not displayed completely if scrolling. * Fuzz job crash output: fuzz-2022-10-13-7166.pcap. * Decoding bug H.245 userInput Signal. * CFDP dissector doesn’t handle \\\"destination filename\\\" only. * Home page capture button doesn’t pop up capture options dialog. * Missing dot in H.248 protocol name. * Missing dot for protocol H.264 in protocol column. * Fuzz job crash output: fuzz-2022-10-23-7240.pcap.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.1.html * Fri Oct 07 2022 ecsos - Added an additional desktopfile to start wireshark which asks for the super user password. * Thu Oct 06 2022 ecsos - Fix build error for Leap. * Wed Oct 05 2022 Robert Frohl - Wireshark 4.0.0: * The display filter syntax is more powerful with many new extensions. * The Conversation and Endpoint dialogs have been redesigned. * The default main window layout has been changed so that the Packet Detail and Packet Bytes are side by side underneath the Packet List pane. * Hex dump imports from Wireshark and from text2pcap have been improved. * Speed when using MaxMind geolocation has been greatly improved.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html- updated wireshark-0010-dumpcap-permission-denied.patch- dropped wireshark-0001-pkgconfig.patch which was accepted upstream * Thu Sep 08 2022 Robert Frohl - Wireshark 3.6.8: * CVE-2022-3190: F5 Ethernet Trailer dissector infinite loop (boo#1203388).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.8.html * Thu Jul 28 2022 Robert Frohl - Wireshark 3.6.7: * Multiple Files preference \"Create new file automatically… after\" [time] working incorrectly. * get_filter Lua function doesn’t return the filter. * Dissector bug, protocol HTTP failed assertion \"saved_layers_len < 500\" with chunked/multipart. * Wrong EtherCAT bit label (possible dissector bug). * UDP packets falsely marked as \"malformed packet\". * TLS certificate parser with filter crash. * Incorrect type for the IEC 60870 APDU appears in packet details pane. * NHRP Problem. * EtherCAT CoE header unknown type.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.7.html * Mon Jun 20 2022 Robert Frohl - Wireshark 3.6.6: * TLS: RSA decryption fails with Extended Master Secret and renegotiation. * \"dfilter\" file on Windows adds carriage returns, and requires line feeds. * \"Browse\" button in Prefs/Name Resolution/MaxMind crashes Wireshark on macOS. * TFTP: some packets are not recognized as TFTP packets with 3.6.5.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.6.html * Thu May 05 2022 Robert Frohl - Wireshark 3.6.5 and 3.6.4: * The 3.6.5 release fixes an installation issue on Windows which was introduced in the 3.6.4 release * Build failure with GCC 7.5, Linux. * RDP dissected as SSL. * IPFIX/cflow dissector asserts when varlen field length is zero. * 802.11ax HE PHY \"Device Class\" dissected incorrectly. * DHCPv6 Option 15 User-Class incorrectly parsed in Wireshark. * ICMPv6 dissector: PREF64 option parsing only works for prefix length 96. * Switch macOS updater to Sparkle 2. * CQL timestamp dissector displays the wrong timestamp. * Unable to dissect 802.11ax Target Wake Time (TWT) packets.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.4.html * Thu Mar 24 2022 Robert Frohl - Wireshark 3.6.3: * Fuzz job crash output: fuzz-2021-01-19-7399.pcap. * TLS dissector incorrectly reports JA3 values. * \"Wiki Protocol page\" in packet details menu is broken - wiki pages not migrated to GitLab?. * Dissector bug, protocol PFCP display Flow Description IE value error in Additional Flow Description of PFD Management Request Message. * Bluetooth: Fails to open Log file for SCO connection. * Fuzz job crash output: fuzz-2022-03-07-10896.pcap. * libwiretap: Save as ERF causes segmentation fault. * HTTP server returning multiple early hints shows too many responses in \"Follow HTTP Stream\".- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.3.html * Fri Feb 11 2022 Robert Frohl - Wireshark 3.6.2: * CVE-2022-0586: RTMPT dissector infinite loop (boo#1195866) * CVE-2022-0585: Large loops in multiple dissectors (boo#1195867) * CVE-2022-0583: PVFS dissector crash (boo#1195868) * CVE-2022-0582: CSN.1 dissector crash (boo#1195869) * CVE-2022-0581: CMS dissector crash (boo#1195870)- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.2.html * Tue Jan 18 2022 Robert Frohl - Fix wireshark-plugin-libvirt build after wmem_alloc() moved from libwireshark.so to libwsutil.so (bsc#1194780) * Added wireshark-0001-pkgconfig.patch- Renamed wireshark-0001-dumpcap-permission-denied.patch to wireshark-0010-dumpcap-permission-denied.patch * Mon Jan 10 2022 Robert Frohl - Fix SLE15 build issue added wireshark-0000-wsutil-implicit_declaration_memcpy.patch * Thu Dec 30 2021 Robert Frohl - Wireshark 3.6.1: * CVE-2021-4185: RTMPT dissector infinite loop (boo#1194166) * CVE-2021-4184: BitTorrent DHT dissector infinite loop (boo#1194167) * CVE-2021-4183: pcapng file parser crash (boo#1194168) * CVE-2021-4182: RFC 7468 file parser infinite loop (boo#1194169) * CVE-2021-4181: Sysdig Event dissector crash (boo#1194170) * CVE-2021-4190: Kafka dissector infinite loop (boo#1194171) * Add \'-o console.log.level:\' transitional option for backward- compatibilty replacing the \'console.log.level\' preference removed in 3.6.0. Only avoids cli failures and will be removed in the future.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.1.html * Mon Dec 20 2021 Robert Frohl - Wireshark 3.6.0: * CVE-2021-4186: Gryphon dissector crash (boo#1194165). * Several changes have been made to the display filter syntax: - The expression \"a != b\" now always has the same meaning as \"!(a == b)\". In particular this means filter expressions with multi-value fields like \"ip.addr != 1.1.1.1\" will work as expected (the result is the same as typing \"ip.src != 1.1.1.1 and ip.dst != 1.1.1.1\"). This avoids the contradiction (a == b and a!= b) being true. - It is possible to use the syntax \"a ~= b\" or \"a any_ne b\" to recover the previous (inconsistent with \"==\") logic for not equal. - Literal strings can now be specified using raw string syntax, identical to raw strings in the Python programming language. This can be used to avoid the complexity of using two levels of character escapes with regular expressions. - Set elements must now be separated using a comma. A filter such as http.request.method in {\"GET\" \"HEAD\"} must be written as ... in {\"GET\", \"HEAD\"}. Whitespace is not significant. The previous use of whitespace as separator is deprecated and will be removed in a future version. - Support for the syntax \"a not in b\" with the same meaning as \"not a in b\" has been added. * TCP conversations now support a completeness criteria, which facilitates the identification of TCP streams having any of opening or closing handshakes, a payload, in any combination. It can be accessed with the new tcp.completeness filter. * Protobuf fields that are not serialized on the wire or otherwise missing in capture files can now be displayed with default values by setting the new \"add_default_value\" preference. The default values might be explicitly declared in \"proto2\" files, or false for bools, first value for enums, zero for numeric types. * Wireshark now supports reading Event Tracing for Windows (ETW). A new extcap named ETW reader is created that now can open an etl file, convert all events in the file to DLT_ETW packets and write to a specified FIFO destination. Also, a new packet_etw dissector is created to dissect DLT_ETW packets so Wireshark can display the DLT_ETW packet header, its message and packet_etw dissector calls packet_mbim sub_dissector if its provider matches the MBIM provider GUID. * \"Follow DCCP stream\" feature to filter for and extract the contents of DCCP streams. * Wireshark now supports dissecting RTP packets with OPUS payloads. * Added support for Shared Memory Communications (SMC) (jsc#SLE-18727)- Further features, bug fixes and new and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.0.html- updated patch to work with upstream changes wireshark-0001-dumpcap-permission-denied.patch * Thu Nov 18 2021 Paolo Stivanin - Wireshark 3.4.10 (bsc#1192830): * CVE-2021-39929: Bluetooth DHT dissector crash. * CVE-2021-39926: Bluetooth HCI_ISO dissector crash. * CVE-2021-39925: Bluetooth SDP dissector crash. * CVE-2021-39924: Bluetooth DHT dissector large loop. * CVE-2021-39922: C12.22 dissector crash. * CVE-2021-39928: IEEE 802.11 dissector crash. * CVE-2021-39921: Modbus dissector crash. * CVE-2021-39920: IPPUSB dissector crash. * PNRP dissector large loop. * Fix forward compatibility issue with the I/O Graphs preferences. * OSS-Fuzz: Heap-use-after-free in ROS. * Allow for \'\\0\' (NULL) character as filter instead of requiring 0x00 for the character match. * Dumpcap with threads reports double received count vs captured. * HTTP2 dissector reports an assertion error on large data frames. * Shark stops capturing when capturing with multiple files and packet printing enabled.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.10.html * Thu Oct 07 2021 Robert Frohl - Wireshark 3.4.9: * TShark PDML output embeds \"proto\" elements within other \"proto\" elements. * Filter expressions comparing against single-octet hex strings where the hex digit string equals a protocol name don’t work. * AMQP 0.9: dissector fails to handle Content-Body frame split across TCP packets. * IEEE 802.15.4: Missing check on \"PAN ID Present\" bit of the Multipurpose Frame Control field. * Wireshark ignored some character in filename when exporting SMB objects.- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.9.html * Thu Aug 26 2021 Robert Frohl - Wireshark 3.4.8: * Dissector bug reported for Bluetooth Cycling Power Measurement characteristic for extreme angles value * Raknet Addresses are incorrectly identified. * Editcap saving files as ethernet when specifying \'-T ieee-802-11- *\' * CoAP dissector confuses Content-Format with Accept- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.8.html * Fri Jul 16 2021 Robert Frohl - Wireshark 3.4.7: * CVE-2021-22235: Fix DNP dissector crash (boo#1188375, wnpa-sec-2021-06) * Fix TCP dissector - Erroneous DSACK reporting * Fix No wlan_radio.duration calculated for PHY type: 802.11ac (VHT) * Fix NAN Dissector has wrong minimum length for availability attribute * Thu Jun 03 2021 Andreas Stieger - Wireshark 3.4.6: * Fix DVB-S2-BB dissector infinite loop (boo#1186790, wnpa-sec-2021-04) * Fix Macro filters handling of escaped characters * Fix Display filter crash * Fix IEEE-1588 Signalling Unicast TLV incorrectly reported as being malformed * Fix IETF QUIC TLS decryption error with extraneous packets during the handshake * Fix Statistics - Resolved Addresses: multi-protocol (TCP/UDP/...) ports not displayed * Thu Apr 22 2021 Andreas Stieger - Wireshark 3.4.5: * CVE-2021-22207: MS-WSP dissector excessive memory consumption (boo#1185128, wnpa-sec-2021-04) * Fix TShark not printing GeoIP information * FIx TShark error when piping to \"head\" * Fix missing parts of ASCII representation in Packet Bytes pane * Fix dissection of NDPE attribute of NAN packet * Fix TECMP: reserved flag interpreted as part of timestamp * Fix DNS IXFR/AXFR multiple response * Fix File too large issue- drop patches: * cmake_3-20_compatibility_1.patch * cmake_3-20_compatibility_2.patch * wireshark-0008-move-glib.patch * Wed Mar 31 2021 Robert Frohl - cmake 3.20 compatibility (boo#1184110) add cmake_3-20_compatibility_1.patch and cmake_3-20_compatibility_2.patch * Tue Mar 30 2021 Neal Gompa - Add patch from Fedora to fix build with glib2-2.68 + Patch: wireshark-0008-move-glib.patch * Thu Mar 11 2021 Robert Frohl - Wireshark 3.4.4: * CVE-2021-22191: Wireshark could open unsafe URLs (boo#1183353).- Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.4.html * Fri Feb 19 2021 Robert Frohl - Enable ITU G.729 Annex A/B speech codec for Tumbleweed only * Sat Jan 30 2021 Andreas Stieger - Wireshark 3.4.3: * CVE-2021-22173: fix USB HID dissector memory leak (wnpa-sec-2021-01, boo#1181598) * CVE-2021-22174: fix USB HID dissector crash (wnpa-sec-2021-02, boo#1181599) * Fix bugs in SIP, Telephony, QUIC, SOMEIP-SD, SRv6, TECMP, AUTOSAR-NM, Fibre Channel, f5ethtrailer, ZVT dissectors. * fix TShark crashes with -T ek option * Fri Jan 22 2021 Robert Frohl - Disable ITU G.729 Annex A/B speech codec for SUSE based distros, but keep enabled for openSUSE. * Wed Jan 13 2021 Robert Frohl - provide helpful error message if user doesn\'t have permissions to run dumpcap (bsc#1180102) add wireshark-0001-dumpcap-permission-denied.patch
|
|
|