SHA256
1
0
forked from pool/wireshark

Accepting request 71178 from network:utilities

Update to 1.4.6 (forwarded request 71167 from dimstar)

OBS-URL: https://build.opensuse.org/request/show/71178
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/wireshark?expand=0&rev=43
This commit is contained in:
Sascha Peilicke 2011-05-25 07:43:50 +00:00 committed by Git OBS Bridge
commit 53cbe076ce
4 changed files with 50 additions and 5 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:6033e627c40ac4eec7e95c03728b497ee2bc5851af8c9e58bb89b7496717dc0d
size 20479081

3
wireshark-1.4.6.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:f923f1e923dcb479b7fdb9bc6d4ce4c27ae8ac1f0148f2820bece476872df1d7
size 20496268

View File

@ -1,3 +1,47 @@
-------------------------------------------------------------------
Tue May 24 16:40:30 CEST 2011 - dimstar@opensuse.org
- Update to version 1.4.6:
+ Wireshark and TShark can crash while analyzing TCP packets.
+ Updated protocol support: TCP
- Changes from version 1.4.5:
+ Security Fixes:
- The NFS dissector could crash on Windows.
- The X.509if dissector could crash
+ bugs fixed:
- Cygwin make fails after updating to bash v 4.1.9.2
- Export HTTP > All - System Appears Hung (but isn't).
- Some HTTP responses don't decode with TCP reassembly on.
- Wireshark crashes when cancelling a large sort operation.
- Wireshark crashes if SSL preferences RSA key is actually a
DSA key.
- tshark incorrectly calculates TCP stream for some syn packets
- Wireshark not able to decode the PPP frame in a sflow
(RFC3176) flow sample packet because Wireshark incorrectly
read the protocol in PPP frame header. (Bug 5746)
- Mysql protocol dissector: all fields should be little endian.
- Error when opening snoop from Juniper SSG-140.
- svnversion: command not found.
- Value of TCP segment data cannot be copied.
- proto_field_is_referenced() is not exported in
libwireshark.dll
- Wireshark ver. 1.4.4 not displayed "Granted QoS" field in a
A11 packet.
+ Updated protocol support:
HTTP, LDAP, MySQL, NFS, sFlow, SSL, TCP
- Drop patches (fixed upstream):
+ wireshark-1.4.4-CVE-2011-1590.patch
+ wireshark-1.4.4-CVE-2011-1591.patch
+ wireshark-1.4.4-CVE-2011-1592.patch
-------------------------------------------------------------------
Tue Apr 26 09:11:54 UTC 2011 - cyliu@novell.com
- security fixes [#bnc 688109]
* CVE-2011-1590: Use of un-initialised variables
* CVE-2011-1592: Crash in NFS dissector on Windows
* CVE-2011-1591: Buffer overflow in DECT dissector
-------------------------------------------------------------------
Tue Mar 8 10:59:35 CST 2011 - cyliu@novell.com

View File

@ -20,7 +20,7 @@
%define use_caps 0
Name: wireshark
Version: 1.4.4
Version: 1.4.6
Release: 1
License: GPLv2+
Summary: A Network Traffic Analyser
@ -100,6 +100,7 @@ view the reconstructed stream of a TCP session.
%patch3 -p1
%patch4 -p1
%patch5 -p1
sed -i 's/^Icon=wireshark.png$/Icon=wireshark/' wireshark.desktop
# run as root on 11.3 and older - bnc#349782
%if ! %{use_caps}
@ -108,7 +109,7 @@ sed -i 's!^Exec=wireshark!Exec=/usr/bin/xdg-su -c /usr/bin/wireshark!' wireshark
%endif
%build
%configure
%configure --without-zlib
make %{?_smp_mflags}
%install