Thu Jan 8 18:51:44 2015 UTC ()
Update "wireshark" package to version 1.10.12. Changes since 1.10.11:
- Bug Fixes
The following vulnerabilities have been fixed.
* wnpa-sec-2014-20
SigComp UDVM buffer overflow. (Bug 10662)
CVE-2014-8710
* wnpa-sec-2014-21
AMQP crash. (Bug 10582) CVE-2014-8711
* wnpa-sec-2014-22
NCP crashes. (Bug 10552, Bug 10628) CVE-2014-8712
CVE-2014-8713
* wnpa-sec-2014-23
TN5250 infinite loops. (Bug 10596) CVE-2014-8714
The following bugs have been fixed:
* 6LoWPAN Mesh headers not treated as encapsulating address.
(Bug 10462)
* UCP dissector bug of operation 31 - PID 0639 not
recognized. (Bug 10463)
* iSCSI dissector rejects PDUs with "expected data transfer
length" > 16M. (Bug 10469)
* GTPv2: trigging_tree under Trace information has wrong
length. (Bug 10470)
* Attempt to render an SMS-DELIVER-REPORT instead of an
SMS-DELIVER. (Bug 10547)
* IPv6 Mobility Option IPv6 Address/Prefix marks too many
bytes for the address/prefix field. (Bug 10576)
* IPv6 Mobility Option Binding Authorization Data for FMIPv6
Authenticator field is read beyond the option data.
(Bug 10577)
* IPv6 Mobility Option Mobile Node Link Layer Identifier
Link-layer Identifier field is read beyond the option data.
(Bug 10578)
* Malformed PTPoE announce packet. (Bug 10611)
* IPv6 Permanent Home Keygen Token mobility option includes
too many bytes for the token field. (Bug 10619)
* IPv6 Redirect Mobility Option K and N bits are parsed
incorrectly. (Bug 10622)
* IPv6 Care Of Test mobility option includes too many bytes
for the Keygen Token field. (Bug 10624)
* IPv6 MESG-ID mobility option is parsed incorrectly.
(Bug 10625)
* IPv6 AUTH mobility option parses Mobility SPI and
Authentication Data incorrectly. (Bug 10626)
* IPv6 DNS-UPDATE-TYPE mobility option includes too many
bytes for the MD identity field. (Bug 10629)
* IPv6 Local Mobility Anchor Address mobility option's code
and reserved fields are parsed as 2 bytes instead of 1.
(Bug 10630)
* TShark crashes when running with PDML on a specific packet.
(Bug 10651)
* IPv6 Mobility Option Context Request reads an extra
request. (Bug 10676)
- Updated Protocol Support
6LoWPAN, AMQP, GSM MAP, GTPv2, H.223, IEEE 802.11, iSCSI, MIH,
Mobile IPv6, PTPoE, TN5250, and UCP
- New and Updated Capture File Support
Catapult DCT2000, HP-UX nettl, pcap-ng, and Sniffer (DOS)
(tron)
diff -r1.127 -r1.128 pkgsrc/net/wireshark/Makefile
diff -r1.78 -r1.79 pkgsrc/net/wireshark/distinfo
--- pkgsrc/net/wireshark/Makefile 2014/11/14 12:06:10 1.127
+++ pkgsrc/net/wireshark/Makefile 2015/01/08 18:51:44 1.128
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.127 2014/11/14 12:06:10 tron Exp $
+# $NetBSD: Makefile,v 1.128 2015/01/08 18:51:44 tron Exp $
-DISTNAME= wireshark-1.10.11
+DISTNAME= wireshark-1.10.12
CATEGORIES= net
MASTER_SITES= http://www.wireshark.org/download/src/ \
${MASTER_SITE_SOURCEFORGE:=wireshark/}
--- pkgsrc/net/wireshark/distinfo 2014/11/14 12:06:10 1.78
+++ pkgsrc/net/wireshark/distinfo 2015/01/08 18:51:44 1.79
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.78 2014/11/14 12:06:10 tron Exp $
+$NetBSD: distinfo,v 1.79 2015/01/08 18:51:44 tron Exp $
-SHA1 (wireshark-1.10.11.tar.bz2) = f8c75b65d79fc597a7a2468cf01d4e3061997ebf
-RMD160 (wireshark-1.10.11.tar.bz2) = 85a0752554cd5911faf1072bb8f99d401680c9f4
-Size (wireshark-1.10.11.tar.bz2) = 26857388 bytes
+SHA1 (wireshark-1.10.12.tar.bz2) = 01ca897e3998243685688233a81c58518a0641bc
+RMD160 (wireshark-1.10.12.tar.bz2) = a6fc3313a17c538b22d72d7a84670a525145c3a5
+Size (wireshark-1.10.12.tar.bz2) = 26934268 bytes
SHA1 (patch-AUTHORS) = 2d4265d9b8b4df7e3ab438684637058fdcb391fc
SHA1 (patch-aa) = 237c60ae1bd860bdc3ee42a17a46b4e212b97c0f
SHA1 (patch-ac) = 470a2a32a5577f16aef4ba3e638eb6b97c483ba3