55796dce7ca765d7ebd2d71d1e60532a0.99.4unknown8bb9f34a1b5a3b340389616e19a748bf0.99.5unknownd9f78791af410777908a7182ac8c2d220.99.5unknownc82cbc7ced4dea97705a18abc4e501c50.99.5unknown73e0123b1eb12e9d1b9da42302c955db0.99.6unknownfc5d6aa9aa270985d8a04149e767b38f0.99.6unknown6a7b2b2faa9697991eb402520a65b1860.99.6unknowncd64116b464f01529e2bca6e4d1013fe0.99.7unknown82a57b8614ec877abcb85c378f72ca9c0.99.7unknownbb74b5748e73651f0a60644976af04f80.99.7unknown0f0be5d56b1d9b29dc224f457067b7030.99.8unknown7611efc5d64e9e66a8107da8682d05471.0.0unknown40a5e77d06c76cc8e1f4020960abc4651.0.3unknown74198e5a322c001bd36037dc21ece2e71.0.4unknown1812a78e371a1beb47d05b7823f3313a1.0.4unknown7bea5aa2b0398f669531beea39b358e51.0.5unknownc813baa1f9d701e56b25f35fc1c42b5f1.0.6unknown48d82d66ccbe5a97dfdb0fdd0e00abf11.0.7unknown6738c623b2ef532ac7d46f2632ce405c1.0.8unknowndceaa16d87da47d346d19630b44d8a3a1.2.0unknownde80d682b585045948b308d1d96f972e1.2.0unknown573b6196e302d5cfbd22b58a6ad6316c1.2.0unknown647cd1f2d1d235a63489d675ae9d8b5f1.2.1unknown33426098476e626ab1095a8fa855fca51.2.1autobuildCopy from network:utilities/wireshark based on submit request 21610 from user prusnak
33426098476e626ab1095a8fa855fca51.2.1autobuildCopy from network:utilities/wireshark based on submit request 21610 from user prusnak
ec1274cffd31dc68e1ec3966ba2764e61.2.3autobuildCopy from network:utilities/wireshark based on submit request 23589 from user prusnak
a6a899dd9cff8c20855550f7c09694081.2.4autobuildCopy from network:utilities/wireshark based on submit request 24922 from user prusnak
e4dfb35d7c51da8035bd5c9844307a921.2.6autobuildCopy from network:utilities/wireshark based on submit request 30911 from user prusnak
97e7d4ef45e2d861f5fbacbf364bfd2c1.2.6autobuild8f16ef24566abad2dfc476f5be8fb4c21.2.8autobuildCopy from network:utilities/wireshark based on submit request 40022 from user prusnak
4002225ca6e9d02d746cbff199f175f98028b1.2.8autobuildCopy from network:utilities/wireshark based on submit request 41072 from user prusnak
4107225ca6e9d02d746cbff199f175f98028b1.2.8autobuildrelease number sync25ca6e9d02d746cbff199f175f98028b1.2.8autobuildrelease number syncd20ca80617667a1205028b53f7e78f761.4.0autobuildCopy from network:utilities/wireshark based on submit request 49900 from user coolo
49900d42c1a913a4ae132761365bea042e8c61.4.1oertelAccepted submit request 53412 from user coolo
53412fa3735fefa13c60c813126c2a455dccd1.4.1autobuildAutobuild autoformatter for 53412
b674e9526e6c155e7d9dd4768bf47e121.4.2azouhrAccepted submit request 56288 from user prusnak
562883100711844e122a29ba7e111e220dd691.4.2azouhrAutobuild autoformatter for 56288
3100711844e122a29ba7e111e220dd691.4.2autobuild11.4 source splitb422e9f37db9d302ef3c62d454be797d1.4.3oertelAccepted submit request 61611 from user prusnak
61611cc7c84564582b19374be232cd9a905991.4.3oertelAutobuild autoformatter for 61611
9d0a630a836881a9157a9129ec2c2a3f1.4.4saschpeAccepted submit request 66861 from user coolo
66861201f81c67ff8dd899fdd647d44574fb81.4.6saschpeUpdate to 1.4.6 (forwarded request 71167 from dimstar)71178b6fa98a367a23105f7f2a3f832cec6f81.4.6lrupp- security fixes (#bnc 718032)
* CVE-2011-3266: Wireshark IKE dissector vulnerability
* CVE-2011-3360: Wireshark Lua script execution vulnerability
* CVE-2011-3483: Wireshark buffer exception handling vulnerability (forwarded request 87344 from cyliu)87415b6fa98a367a23105f7f2a3f832cec6f81.4.6adrianSuSE44ddad5517552b4845417900b58d894d1.6.3cooloupdate to 1.6.3 (forwarded request 90132 from tabraham1)90137a4fa258bc2918ab37dc9370cb9767a611.6.3cooloreplace license with spdx.org variantc415f1c65407a3e5aa1f8b9f1c101bed1.6.5coolo- update to 1.6.5 (fix bnc#741187, #741188, #741190)
- Security fixes:
- wnpa-sec-2012-01 Laurent Butti discovered that Wireshark failed to
properly check record sizes for many packet capture file formats.
(Bug 6663, bug 6666, bug 6667, bug 6668, bug 6669, bug 6670)
- wnpa-sec-2012-02 Wireshark could dereference a NULL pointer and
crash. (Bug 6634)
- wnpa-sec-2012-03 The RLC dissector could overflow a buffer. (Bug 6391)
- Bug fixes:
- "Closing File!" Dialog Hangs. (Bug 3046)
- Sub-fields of data field should appear in exported PDML as children
of the data field instead of as siblings to it. (Bug 3809)
- Incorrect time differences displayed with time reference set. (Bug 5580)
- Wrong packet type association of SNMP trap after TFTP transfer. (Bug 5727)
- SSL/TLS decryption needs wireshark to be rebooted. (Bug 6032)
- Export HTTP Objects -> save all crashes Wireshark. (Bug 6250)
- Wireshark Netflow dissector complains there is no template found though
the template is exported. (Bug 6325)
- DCERPC EPM tower UUID must be interpreted always as little endian.
(Bug 6368)
- Crash if no recent files. (Bug 6549)
- IPv6 frame containing routing header with 0 segments left calculates wrong
UDP checksum. (Bug 6560)
- IPv4 UDP/TCP Checksum incorrect if routing header present. (Bug 6561)
- Incorrect Parsing of SCPS Capabilities Option introduced in response
to bug 6194. (Bug 6562)
- Various crashes after loading NetMon2.x capture file. (Bug 6578)
- Fixed compilation of dumpcap on some systems (when MUST_DO_SELECT is
defined). (Bug 6614)
- SIGSEGV in SVN 40046. (Bug 6634) (forwarded request 100680 from cyliu)100725c0d7be3e098d22ee8e85cefb9853cf9d1.6.5cooloAdd detection for an important flag in NetrServerAutiticate call for MSRPC Netlogon. (forwarded request 107780 from gladiac)107794598130edaf7db1c0464f134a7c2afd2d1.6.6cooloUpdate to 1.6.6 (forwarded request 112096 from Zaitor)11209972c61df8933a4575026981d4832826e51.6.7coolo- Update to version 1.6.7:
+ Bugs fixed:
- Malformed Packets H263-1996 (RFC2190). (Bug 6996)
- Wireshark could crash while trying to open an rpcap: URL.
(Bug 6922)
+ Updated H.263 Protocol Support (forwarded request 113671 from RedDwarf)113674660d72de0e6e1b4a9a2a4ece821949701.6.8cooloupdate to upstream 1.6.8, re-submit with with assigned CVEs121992daeb87c1f60c536c07eb47a3c65b8fd31.6.8cooloHi, the devel package was not useable for development at all. I added the missing headers as other distros do which allows building dissectors out of the source tree now. (forwarded request 123394 from FunkyM)123396daeb87c1f60c536c07eb47a3c65b8fd31.6.8adrianSuSEbranched from openSUSE:Factory247faf850ad85f70e69c5392b9db37121.8.0cooloupdate to upstream 1.8.0 (forwarded request 125845 from AndreasStieger)12584645562a49331cd1c4cb97ad06a61cfd3a1.8.1cooloupdate to upstream 1.8.1 (bnc#772738, CVE-2012-4048, CVE-2012-4049) (forwarded request 128812 from AndreasStieger)128815bd1b1fe04c97144b891b7a2ab9f6f49e1.8.2namtracupdate to upstream 1.8.2 (bnc#776083)
CVE-2012-4285
CVE-2012-4287
CVE-2012-4288
CVE-2012-4294
CVE-2012-4295
CVE-2012-4289
CVE-2012-4296
CVE-2012-4297
CVE-2012-4291
CVE-2012-4292
CVE-2012-4293
CVE-2012-4290
CVE-2012-4286
CVE-2012-4298 (forwarded request 130973 from AndreasStieger)13097548a4386ea9a95b1b8e3c3a22a3f462601.8.2namtraclicense update: GPL-2.0+ and GPL-3.0+
According to the COPYING file the PIDL utility (standalone tool) is GPL-3.0+ licensed (forwarded request 132149 from babelworx)132210be2a2a4f24b889691cfeb8970e60f1811.8.3cooloupdate to upstream 1.8.3 (bnc#783275, bnc#778000) (forwarded request 136810 from AndreasStieger)13681150a4db339ab78b79fe1caac21e06c7d41.8.3coolo- for openSUSE 12.2 and later, build against lua51-devel instead
of lua-devel for Lua support (bnc#780669) (forwarded request 141212 from AndreasStieger)141213d7ce061c849fe86b2e45ebe1ac7f10721.8.4coolo- update to 1.8.4 [bnc#792005]
+ vulnerabilities fixed:
* Wireshark could leak potentially sensitive host name
resolution information when working with multiple pcap-ng
files.
wnpa-sec-2012-30 CVE-2012-5592
* The USB dissector could go into an infinite loop.
wnpa-sec-2012-31 CVE-2012-5593
* The sFlow dissector could go into an infinite loop.
wnpa-sec-2012-32 CVE-2012-5594
* The SCTP dissector could go into an infinite loop.
wnpa-sec-2012-33 CVE-2012-5595
* The EIGRP dissector could go into an infinite loop.
wnpa-sec-2012-34 CVE-2012-5596
* The ISAKMP dissector could crash.
wnpa-sec-2012-35 CVE-2012-5597
* The iSCSI dissector could go into an infinite loop.
wnpa-sec-2012-36 CVE-2012-5598
* The WTP dissector could go into an infinite loop.
wnpa-sec-2012-37 CVE-2012-5599
* The RTCP dissector could go into an infinite loop.
wnpa-sec-2012-38 CVE-2012-5600
* The 3GPP2 A11 dissector could go into an infinite loop.
wnpa-sec-2012-39 CVE-2012-5601
* The ICMPv6 dissector could go into an infinite loop.
wnpa-sec-2012-40 CVE-2012-5602
+ Further bug fixes and updated protocol support as listed in:
http://www.wireshark.org/docs/relnotes/wireshark-1.8.4.html (forwarded request 143616 from AndreasStieger)143617a98cd5bddcf9922496ac281a7d041deb1.8.4coolo- Add wireshark-suidflags.patch: Allow to pass SUID_{C,LD}FLAGS to
introduce -fPIE -pie as needed for suid binaries
- Add libtool BuildRequires and call to autoreconf, as above patch
touches the build system.
- Export SUID_{C,LD}FLAGS with appropriate flags. (forwarded request 144930 from dimstar)144938a579a8a56d42a51d673b471ca83ac6ce1.8.4coolo- build with gtk3 on 11.4+
- disable zlib makes a sense for 1.2.5 only
- turn some features on (python, gcrypt, gnutls, plugins dir) (forwarded request 145724 from mvyskocil)145774a579a8a56d42a51d673b471ca83ac6ce1.8.4adrianSuSESplit 12.3 from Factory55ebb9364ea720d29153e512d63a887a1.8.5cooloupdate to 1.8.5 [bnc#801131]1505085b0fc69e8d4cbee20b8536327c1f6f251.8.6cooloupdate to 1.8.6 [bnc#807942] (forwarded request 157610 from AndreasStieger)15761162d3516014e063a4554fb1cdf2eeb1321.8.6cooloAutomatic submission by obs-autosubmit159645a825ffc78ec220227fecce2dc976e3a51.8.7cooloupdate to 1.8.7 [bnc#820566]176451b5e8450d8c68e7b16744d314e5fd4e111.10.0coolo1.10.0 (forwarded request 177834 from AndreasStieger)177835f52fe10eb1c4dc2dd4fc6c850b282b1d1.10.0coolo- fix factory builds, prevent build failures with pod2man:
wireshark-1.10.0-authors-pod2man.patch
wireshark-1.10.0-pod-characters.patch (forwarded request 181206 from AndreasStieger)181207413afd9f27d4a30dfcd43b56b5f75cb71.10.1cooloupdate to 1.10.1 [bnc#831718] (forwarded request 184464 from AndreasStieger)184465ed8d647c22a4240a6af1765ce180b8431.10.1scarabeus_factory- gtk3 version in openSUSE Factory (13.1) deprecates elements used
in wireshark 1.10.1. Revert back to gtk2 UI. (forwarded request 195570 from AndreasStieger)195571110c9f42a33c30e125ff0f1d23729aa01.10.2scarabeus_factoryupdate to 1.10.2 [bnc#839607] (forwarded request 198594 from AndreasStieger)198596110c9f42a33c30e125ff0f1d23729aa01.10.2adrianSuSESplit 13.1 from Factory830a3219cb21083c287b92ecf8168a801.10.2cooloAdd missing ws_symbol_export.h and frame_data_sequence.h includes to -devel package to allow building of external plugins again (forwarded request 199674 from FunkyM)199689858bd711aee98c4562c8c91e7dc90a641.10.2coolo- fix duplicate enum definition to fix build in 13.1 and Factory,
adding wireshark-1.10.x-fix-packet-gluster-duplicate_enums.patch
from upstream commits [bnc#843304] (forwarded request 201521 from AndreasStieger)2015237016a123fcfca67cda5da77f8c205aff1.10.3cooloupdate to 1.10.3 [bnc#848738] (forwarded request 205584 from AndreasStieger)2055858636a58e7e3eb18084569411e4518ce71.10.4cooloupdate to 1.10.4 [bnc#855980] (forwarded request 211297 from AndreasStieger)21129808ddfbf4dbe49968d7b41e84e0653bae1.10.5scarabeus_factoryupdate to 1.10.5 (forwarded request 211788 from AndreasStieger)2117959c62de76686adca702f1ea6c42a43af91.10.6cooloupdate to 1.10.6 [bnc#867485] (forwarded request 225144 from AndreasStieger)225147c616803dd62ac7c7c7f25fa3dab9418e1.10.7cooloWireshark 1.10.7 [bnc#874760] CVE-2014-290231200f1b776bfe59d47cc73993aa72d0d1e8a1.10.8coolo1237315e4bc4d7dc97e5c7d6d77369ad82f63351.10.9coolo1243331bcb13d8ec63376271d387b9dd028f2041.12.0lnusselWireshark 1.12.0244628adaac9714bcc2a54ce4f265b84b35fbd1.12.0lnusselexperimental Qt UI for wireshark
split UI into wireshark-ui-{gtk,qt}244989adaac9714bcc2a54ce4f265b84b35fbd1.12.0adrianSuSESplit 13.2 from Factory7e79c7ecd4d89499b5f33f1e1147772c1.12.0coolo1249679da541b9e4b01abc6e53cd0160375c1501.12.1cooloAutomatic submission by obs-autosubmit2520103a33f0b831d7a5ed12acf32ba97592931.12.2dimstar_suseWireshark 1.12.22614985f2a0c9f7f91e92649d5e413a8c5f8cb1.12.2dimstar_suseAutomatic submission by obs-autosubmit2647266ac6e3cd4155a50835dc6d806579d8601.12.2dimstar_suse127999023da82ce38dcc37b5efa817abb37cd1b1.12.3dimstar_suse12805186a49c0bd720d723602e675baf73e5cf91.12.4dimstar_suse1289293b503bac9a3cd05112ad5b363e3055feb1.12.4dimstar_suse12951517f053bc26727f72b1bc808e43b3a82131.12.4coolo130428871a4217d15d917b126f4d6a33758d44e1.12.5coolo1306749d3d882b4369a6a714fefe58d5b7d92451.12.5dimstar_suse13084500b8145520d2e5f073486ad718736c9001.12.6coolo1316382671da02d2dad9123e9d0611d6be6ce7e1.12.6coolo131983155a6192f76f8493456cdce4f0a84e52e1.12.7dimstar_suse132223219e8bee3f4d7783377418abc9dc2af671.12.7cooloAutomatic submission by obs-autosubmit331083bf2ba47dfb93da9cf63ea487e7f58bab1.12.8dimstar_suseWireshark 1.12.8 [boo#950437] CVE-2015-7830
339307f5881fb1601c3c4d9798ac82852279c92.0.0coolo13451566d143d7805a2859f2e066114660dd8642.0.0coolo134832274270e40d2f8cfd056226f2b88eef8502.0.0dimstar_suse13487769475cf7f83f64099c04879ba99dd6da42.0.1dimstar_suseWireshark 2.0.1 boo#960382351292c4356418513a8a98b913780bde8ad9752.0.1dimstar_suseAutomatic submission by obs-autosubmit35307668ad6d1f3a54a78a4e4de2b6b8f52dc92.0.1dimstar_suseAutomatic submission by obs-autosubmit3606672d24627ee7929b9606782cafdc3cea502.0.2dimstar_suseWireshark 2.0.2 (boo#968565) (forwarded request 362195 from AndreasStieger)36219881fa35fc892a77775d60f6f6e825f91d2.0.3dimstar_suse139141825b7905321c61b9b76a1563b5c7361cd2.0.4dimstar_suseWireshark 2.0.4 (boo#983671)401329aaf2720b572ab7ff774cf14bc2b30fb42.0.5dimstar_suseWireshark 2.0.5
bsc#991013 CVE-2016-6505
bsc#991015 CVE-2016-6505
bsc#991017 CVE-2016-6508
bsc#991018 CVE-2016-6509
bsc#991019 CVE-2016-6510
bsc#991020 CVE-2016-6511
bsc#991021 CVE-2016-6512
bsc#991022 CVE-2016-6513416463cb681e645f88686b494f3034a39f92b62.2.0dimstar_suseWireshark 2.2.0,
Wireshark 2.0.6 bsc#998099426936f28b6ac71d8cef44685f6d882d5c65832.2.1dimstar_suseWireshark 2.2.1 bsc#100298143328792e5d2a357ed3b9e4b831701a8f66ced2.2.2dimstar_suseWireshark 2.2.2:
* CVE-2016-9372: Profinet I/O long loop (boo#1010807)
* CVE-2016-9374: AllJoyn crash (boo#1010752)
* CVE-2016-9376: OpenFlow crash (boo#1010735)
* CVE-2016-9373: DCERPC crash (boo#1010754)
* CVE-2016-9375: DTN infinite loop (boo#1010740)
4407397bfb6baa8a85771d4cea0fc6b8f688792.2.3lnussel_factory1446219e5b47e9d8139e1a48823a301ebc843922.2.3dimstar_suse14492894528b468e13d4f26062b7372d95437442.2.4dimstar_suseWireshark 2.2.4 bsc#102173945229719b5adce04ce151264b9e8d4549922762.2.4dimstar_suseAutomatic submission by obs-autosubmit4541273e322face9d6706b3270e69ca02834e82.2.4dimstar_suse1458840513cc579f9e69bf43516e1fb29068bf42.2.5dimstar_suse- Wireshark 2.2.5: boo#1027998
- restore license in about dialog boo#1026507476895f0b6cf77917d96c1aadbd54559bbd67e2.2.5dimstar_suseAutomatic submission by obs-autosubmit478952dd013c6fdd19f1c5a8f0c6af19c185dc2.2.6dimstar_suse- Wireshark 2.2.6:
This release fixes minor vulnerabilities that could be used to
trigger a dissector crash or infinite loops by sending specially
crafted packages over the network or into a capture file:
* CVE-2017-7700: NetScaler file parser infinite loop (bsc#1033936)
* CVE-2017-7701: BGP dissector infinite loop (bsc#1033937)
* CVE-2017-7702: WBMXL dissector infinite loop (bsc#1033938)
* CVE-2017-7703: IMAP dissector crash (bsc#1033939)
* CVE-2017-7704: DOF dissector infinite loop (bsc#1033940)
* CVE-2017-7705: RPCoRDMA dissector infinite loop (bsc#1033941)
* CVE-2017-7745: SIGCOMP dissector infinite loop (bsc#1033942)
* CVE-2017-7746: SLSK dissector long loop (bsc#1033943)
* CVE-2017-7747: PacketBB dissector crash (bsc#1033944)
* CVE-2017-7748: WSP dissector infinite loop (bsc#1033945)
- Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.6.html4879278b41352ab4a7694c5e081475e1951d2a2.2.6dimstar_suseAllow opening capture files from desktop without asking for privileged credentials. bsc#102571449555900c1e1af7c64ae46be98d2e46db650af2.2.7dimstar_suse- Wireshark 2.2.7 (bsc#1042330):
This release fixes minor vulnerabilities that could be used to
trigger dissector crashes, infinite loopsm or cause excessive use
of CPU resources by making Wireshark read specially crafted
packages from the network or a capture file:
* CVE-2017-9352: Bazaar dissector infinite loop (bsc#1042304)
* CVE-2017-9348: DOF dissector read overflow (bsc#1042303)
* CVE-2017-9351: DHCP dissector read overflow (bsc#1042302)
* CVE-2017-9346: SoulSeek dissector infinite loop (bsc#1042301)
* CVE-2017-9345: DNS dissector infinite loop (bsc#1042300)
* CVE-2017-9349: DICOM dissector infinite loop (bsc#1042305)
* CVE-2017-9350: openSAFETY dissector memory exhaustion (bsc#1042299)
* CVE-2017-9344: BT L2CAP dissector divide by zero (bsc#1042298)
* CVE-2017-9343: MSNIP dissector crash (bsc#1042309)
* CVE-2017-9347: ROS dissector crash (bsc#1042308)
* CVE-2017-9354: RGMP dissector crash (bsc#1042307)
* CVE-2017-9353: IPv6 dissector crash (bsc#1042306)5005698fc0d7309d58e04b77943e613c6f11062.2.8dimstar_suseWireshark 2.2.8 (bsc#1049255)5113306f508ce6d50e1c47cd28b158f6c0510f2.4.0dimstar_suse15189676b26e699694810ae20c721f5183de9ca2.4.1dimstar_suseWireshark 2.4.1:
* CVE-2017-13767: MSDP dissector infinite loop (bsc#1056248)
* CVE-2017-13766: Profinet I/O buffer overrun (bsc#1056249)
* CVE-2017-13764: Modbus dissector crash (bsc#1056250)
* CVE-2017-13765: IrCOMM dissector buffer overrun (bsc#1056251)51968769f766b0950fb14f79032806beddc6cb2.4.1dimstar_suse1522191df34139378492be00df57141ca1462c32.4.2dimstar_suseWireshark 2.4.2 boo#1062645533377bbb22df69227192e5871e168b0f6c5932.4.3dimstar_suseWireshark 2.4.3 (bsc#1070727):
* CVE-2017-17084: IWARP_MPA dissector crash (wnpa-sec-2017-47)
* CVE-2017-17083: NetBIOS dissector crash (wnpa-sec-2017-48)
* CVE-2017-17085: CIP Safety dissector crash (wnpa-sec-2017-49)547256ccf993d309f2c965e6ce2be5bffefa6c2.4.4dimstar_suse- Wireshark 2.4.4:
* fixes for dissector crashes:
+ CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
+ CVE-2018-5335: WCP dissector could crash (bsc#1075738)
+ CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
* No longer enable the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems
more vulnerable to Spectre variant 1 (bsc#1075748, CVE-2017-5753)
* Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.4.4.html56393644221e85c170ff75e2bd03df25c7a8a42.4.5dimstar_suseWireshark 2.4.5 (bsc#1082692) (forwarded request 579773 from AndreasStieger)579774671989b221061c1c56424dfabcce56f62.4.6dimstar_suseWireshark 2.4.6 bsc#10882005937163c3849fc70d99de624c251386b9296e72.6.0dimstar_suseWireshark 2.6.0, turn on some features,
Use capabilities for capture. bsc#9576246053020ae6e283c22e525fabf9e02b1b1355be2.6.1dimstar_suseWireshark 2.6.1 bsc#1094301 boo#1093733611551c2398ac0d8eb80d55f1a7bcaee1aa6502.6.2dimstar_suse- update to 2.6.2:
* CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, boo#1101777)
* CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, boo#1101788)
* CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, boo#1101804)
* CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, boo#11101786)
* CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, boo#11101810)
* CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, boo#11101776)
* CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, boo#11101794)
* CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, boo#11101800)
* CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, boo#11101791)
* CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, boo#1101802)
- Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.6.2.html
- drop wireshark-2.6.1-fix-Qt-5.11.patch, upstream6242338e69a34d33f8b6792e209a7706fca7e82.6.2dimstar_susefix some bug numbers624965835bb140089d5112c742edc9732c1de12.6.3dimstar_suseWireshark 2.6.3 (boo#1106514)63225583e82da6b45b6e38747b1c2b8503d0c32.6.4dimstar_suseWireshark 2.6.4 (bsc#1111647)
* CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
* CVE-2018-18226: Steam IHS Discovery dissector memory leak (wnpa-sec-2018-48)
* CVE-2018-18225: CoAP dissector crash (wnpa-sec-2018-49)
* CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50) (forwarded request 641680 from AndreasStieger)6417321a263d5dda3335104ec353a67790264f2.6.5dimstar_suse- Wireshark 2.6.5 (bsc#1117740):
* CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51)
* CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52)
* CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53)
* CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54)
* CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55)
* CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56)
* CVE-2018-19628: The ZigBee ZCL dissector could crash (wnpa-sec-2018-57)
- Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.6.5.html (forwarded request 652577 from AndreasStieger)65257872d09874d524fdfb09bdbc7236e18f352.6.6dimstar_suse664393de7f8fb874e0d250ddb45328504dc3152.6.7dimstar_suse68013373c2f794194f0d895eddb938b55d5f423.0.1dimstar_suse7015099be9139d5d6302b48a1bc9755c3722633.0.2dimstar_suse70500864f4f3776031265e73d72530588ebed83.0.2dimstar_suse710109e9d05becc3b4f0398d4196b2a72bb3b03.0.3dimstar_suse716597617715ee95e97c36ad0200f32c32bbdf3.0.3dimstar_suse7198659d15dc32a0956bc75fa82632b90ed2223.0.5dimstar_suse732640c417fe9af8461f777768fac2fdb7e2cc3.0.6dimstar_suse742608e7988b7ec00664e09c64cf6e4e74a6973.0.7dimstar_suse754609b2f06dc1d1a85599a28d3387f2b0e8853.2.0dimstar_suseAutomatic submission by obs-autosubmit75958413a07441552f48fdf966307a34cf71083.2.1dimstar_suse765026a803b5fe7b556b14f626059322fab6a43.2.2dimstar_suse7802813219b9f00fc7d2847c1de3e5bfa704f33.2.2dimstar_suse780995af8fed75dfc02efb5f1b5d0a358758b63.2.2dimstar_suse790012dfbe796d8ebbd277b8c46307e02d68ad3.2.3dimstar_suse792676fe87e829f57e7485e5a3dd599f0d26d33.2.4maxlin_factory808100db89e43a5e7b3603c904b829684017983.2.4dimstar_suse8120194ffd99d1eec528b1a09422ceef98cb153.2.5dimstar_suse818270d58e23f6bd98b1c4ca246f2c654767073.2.6dimstar_suse826210ecfb1115161f4fea8c61fc6a81e1c5a63.2.7dimstar_suse* CVE-2020-25863: MIME Multipart dissector crash (boo#1176908)
* CVE-2020-25862: TCP dissector crash (boo#1176909)
* CVE-2020-25866: BLIP dissector crash (boo#1176910) (forwarded request 836544 from AndreasStieger)8382044dfc3d63a58e0330eeac7858a24904263.2.8dimstar_suse845395db2624599379249f004ef4bacd822f483.4.0dimstar_suseupdate wireshark to new major version: 3.4.0846275b610cd8a8749693e730c4dfed4ec1cf33.4.1dimstar_suse8564693bee85c09c76f04c51527d4856d031103.4.2dimstar_suse858203ee238768913ad4e3660633a6c8c152813.4.2dimstar_suseadd dumpcap error message patch86310397a2d06fc50c35afa9a81a83ee24a5c93.4.2dimstar_suse8660542e2051719aa13eadf95707791733228e3.4.3dimstar_suse8683023225cfa4d8b7140777956873f938750a3.4.3RBrownSUSE87438370cb7074f994ab273c9c9c2455f807583.4.4dimstar_suse878299e68ff24a5f70a991d3dc8c2bad40a4cf3.4.4dimstar_susewireshark changes for cmake 3.20 and glib88318638abc4344b408f2ded312bcf5c4e94183.4.5dimstar_suse88748594ae5df962d2e26610b68bd893df6f513.4.6dimstar_suse89734164febb6d54333977f17f7eb22f00066c3.4.7dimstar_suse90664830966890cc4c709587bfd600d00d46743.4.8dimstar_suse91435440f893ff550748f2ff903aa72f26d2583.4.9dimstar_suseupdate wireshark to version 3.4.99242409964ff450b5bbfe0e88d8d68447a66403.4.10dimstar_suse932244146f3c761ccc9fc633ae219c5e5c297d3.6.0dimstar_suse94189316a074f9b3b7e18de3ecdee91b6d657e3.6.1dimstar_suse943194cf2ff75af80b2cb9ac6ea7a77f77d4e23.6.1dimstar_suse943538fc6188d943c1de14f4310c9d8058cb143.6.1dimstar_suse94408199be9a5cabf5cc1dbf6167fa857eb5843.6.1dimstar_suse945306113b8a731e57f395734f0c1895b57d573.6.1dimstar_suse947191ba831c499bef8a2c0a718814a33cb98f3.6.2dimstar_suse953787