forked from pool/wireshark
Accepting request 143617 from network:utilities
- update to 1.8.4 [bnc#792005] + vulnerabilities fixed: * Wireshark could leak potentially sensitive host name resolution information when working with multiple pcap-ng files. wnpa-sec-2012-30 CVE-2012-5592 * The USB dissector could go into an infinite loop. wnpa-sec-2012-31 CVE-2012-5593 * The sFlow dissector could go into an infinite loop. wnpa-sec-2012-32 CVE-2012-5594 * The SCTP dissector could go into an infinite loop. wnpa-sec-2012-33 CVE-2012-5595 * The EIGRP dissector could go into an infinite loop. wnpa-sec-2012-34 CVE-2012-5596 * The ISAKMP dissector could crash. wnpa-sec-2012-35 CVE-2012-5597 * The iSCSI dissector could go into an infinite loop. wnpa-sec-2012-36 CVE-2012-5598 * The WTP dissector could go into an infinite loop. wnpa-sec-2012-37 CVE-2012-5599 * The RTCP dissector could go into an infinite loop. wnpa-sec-2012-38 CVE-2012-5600 * The 3GPP2 A11 dissector could go into an infinite loop. wnpa-sec-2012-39 CVE-2012-5601 * The ICMPv6 dissector could go into an infinite loop. wnpa-sec-2012-40 CVE-2012-5602 + Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.8.4.html (forwarded request 143616 from AndreasStieger) OBS-URL: https://build.opensuse.org/request/show/143617 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/wireshark?expand=0&rev=61
This commit is contained in:
commit
bf20628198
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:83a85ff506b5e2a70f03c49de7af291802404983a23c7779e0f4ac3e672a2fb3
|
||||
size 24123989
|
3
wireshark-1.8.4.tar.bz2
Normal file
3
wireshark-1.8.4.tar.bz2
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:cae9ec0cb9fa0b732a76c0f72f8c15d763f8cdc2e389cda2da6c48c24559faac
|
||||
size 24164286
|
@ -1,3 +1,35 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Nov 29 20:15:03 UTC 2012 - andreas.stieger@gmx.de
|
||||
|
||||
- update to 1.8.4 [bnc#792005]
|
||||
+ vulnerabilities fixed:
|
||||
* Wireshark could leak potentially sensitive host name
|
||||
resolution information when working with multiple pcap-ng
|
||||
files.
|
||||
wnpa-sec-2012-30 CVE-2012-5592
|
||||
* The USB dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-31 CVE-2012-5593
|
||||
* The sFlow dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-32 CVE-2012-5594
|
||||
* The SCTP dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-33 CVE-2012-5595
|
||||
* The EIGRP dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-34 CVE-2012-5596
|
||||
* The ISAKMP dissector could crash.
|
||||
wnpa-sec-2012-35 CVE-2012-5597
|
||||
* The iSCSI dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-36 CVE-2012-5598
|
||||
* The WTP dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-37 CVE-2012-5599
|
||||
* The RTCP dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-38 CVE-2012-5600
|
||||
* The 3GPP2 A11 dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-39 CVE-2012-5601
|
||||
* The ICMPv6 dissector could go into an infinite loop.
|
||||
wnpa-sec-2012-40 CVE-2012-5602
|
||||
+ Further bug fixes and updated protocol support as listed in:
|
||||
http://www.wireshark.org/docs/relnotes/wireshark-1.8.4.html
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Nov 14 00:01:02 UTC 2012 - andreas.stieger@gmx.de
|
||||
|
||||
|
@ -20,7 +20,7 @@
|
||||
%define use_caps 0
|
||||
|
||||
Name: wireshark
|
||||
Version: 1.8.3
|
||||
Version: 1.8.4
|
||||
Release: 0
|
||||
Summary: A Network Traffic Analyser
|
||||
License: GPL-2.0+ and GPL-3.0+
|
||||
|
Loading…
Reference in New Issue
Block a user