be84485074
Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2017-38 MSDP dissector infinite loop ([2]Bug 13933) * [3]wnpa-sec-2017-39 Profinet I/O buffer overrun ([4]Bug 13847) * [5]wnpa-sec-2017-41 IrCOMM dissector buffer overrun ([6]Bug 13929) The following bugs have been fixed: * Confusing "Apply a display filter <Command/>" keyboard shortcut. ([7]Bug 12450) * VNC Protocol disector : Framebuffer Updates. ([8]Bug 13910) * DNS LOC RRs with out-of-range longitude or latitude aren't shown as errors. ([9]Bug 13914) * DIS Dissector Entity Appearance Record displayed in wrong location. ([10]Bug 13917) * Win64 CMake bug - (CYGWIN_INSTALL_PATH redefinition) causing missing packages when using CMake 3.9.0. ([11]Bug 13922) * APL records parsed incorrectly for IPv4 prefixes. ([12]Bug 13923) * TCAP SRT Analysis incorrectly matched TCAP begins and ends. ([13]Bug 13926) * E.212: Check length before trying 3-digits MNC. ([14]Bug 13935) * Crash in Wireshark using Dumper:dump() from Lua. ([15]Bug 13944) * GTPv2 - decoding issue for Packet Flow ID (type 123). ([16]Bug 13987) * [oss-fuzz] BGP memleak: ASAN: 276 byte(s) leaked in 5 allocation(s). ([17]Bug 13995) * Some Infiniband Connect Req fields are not decoded correctly. ([18]Bug 13997) * 802.11 wlan.ft.subelem.r0kh_id should be sequence of bytes. ([19]Bug 14004) Updated Protocol Support APL, BGP, DIS, DNS, E.212, GTPv2, IEEE 802.11, InfiniBand, MSDP, MTP2, pcapng MIME, Profinet I/O, SML, TCAP, and VNC
6 lines
419 B
Text
6 lines
419 B
Text
$NetBSD: distinfo,v 1.104 2017/09/04 14:42:25 wiz Exp $
|
|
|
|
SHA1 (wireshark-2.2.9.tar.bz2) = 9a2331260ed04d44438ce6ba54e50a03f6bb42ef
|
|
RMD160 (wireshark-2.2.9.tar.bz2) = d8e0860b02d9dc2019f5c759b53330c12b18f73e
|
|
SHA512 (wireshark-2.2.9.tar.bz2) = ee680ee5da66e251b4bb647296da2c8b9d6ec6b1b74d41d8ac05fd77ce8bec7cd9a5a83bf3769bec4a53e0b50086c6674c0c6fa659b752569d1508f57d0c07c8
|
|
Size (wireshark-2.2.9.tar.bz2) = 32341866 bytes
|