| Message ID | 20260430140521.3523893-2-adolf.belka@ipfire.org |
|---|---|
| State | Staged |
| Commit | 0da4e3d22900b68edc3f100581a48475d42cf2d8 |
| Headers |
Return-Path: <development+bounces-2076-patchwork=ipfire.org@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature ECDSA (secp384r1 raw public key) server-digest SHA384 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail01.haj.ipfire.org", Issuer "R12" (not verified)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4g5wtL2yNKz3x5B for <patchwork@web04.haj.ipfire.org>; Thu, 30 Apr 2026 14:05:30 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [IPv6:2001:678:b28::201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519) (Client CN "mail02.haj.ipfire.org", Issuer "E8" (not verified)) by mail01.ipfire.org (Postfix) with ESMTPS id 4g5wtJ6Vnzz7PC for <patchwork@ipfire.org>; Thu, 30 Apr 2026 14:05:28 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [IPv6:::1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4g5wtJ4Q3Wz33bW for <patchwork@ipfire.org>; Thu, 30 Apr 2026 14:05:28 +0000 (UTC) X-Original-To: development@lists.ipfire.org Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature ECDSA (secp384r1 raw public key) server-digest SHA384 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail01.haj.ipfire.org", Issuer "R12" (not verified)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4g5wtG014Pz2xMD for <development@lists.ipfire.org>; Thu, 30 Apr 2026 14:05:25 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4g5wtD5sH7z7GP; Thu, 30 Apr 2026 14:05:24 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1777557924; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=WQJSPBn/NBe5icjec7XnFFoTtDOFu3wl5UEX9C6RnIM=; b=Ggh/yzKBVwcqtgLIvrheg5liIIRyyhyVd+W4hUo5fhMoSli3tJjnKIU+WBpAOnVK11V2LR tzMTqlGUE2FachAQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1777557924; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=WQJSPBn/NBe5icjec7XnFFoTtDOFu3wl5UEX9C6RnIM=; b=Yh8iPPn8Oulfxq1gby3EBSNpAWmDm9eeO+8rPxvIlNF07sjESXT1PjHKZik3fcvArjOGWb aquyop/xoxB/oj30ZPe1Npc7aUWs8AwSjkPmpnc1/cQHP2pSg2qmfcxkDIM87MSvIwyjr1 GIkkZXV9U1I9AeLSfFmkPJIJ1SMEswFNddHTiZrwx84brZDjA9Ech34j+aTyEeuEJTfb6r r9+fR4F2mAIQ3lwNmzKDIAfPKa06Ff8/KE+f8ULv5xOsXrYf2gGslU7eItywZ3f7oKqNA/ erIu+VCjfTpNPaMsPZDcXeJTV73iDmY1365SUuloKZrzhzXvggS134ekmMy8dg== From: Adolf Belka <adolf.belka@ipfire.org> To: development@lists.ipfire.org Cc: Adolf Belka <adolf.belka@ipfire.org> Subject: [PATCH] tshark: Update to version 4.6.5 Date: Thu, 30 Apr 2026 16:05:20 +0200 Message-ID: <20260430140521.3523893-2-adolf.belka@ipfire.org> In-Reply-To: <20260430140521.3523893-1-adolf.belka@ipfire.org> References: <20260430140521.3523893-1-adolf.belka@ipfire.org> Precedence: list List-Id: <development.lists.ipfire.org> List-Subscribe: <https://lists.ipfire.org/>, <mailto:development+subscribe@lists.ipfire.org?subject=subscribe> List-Unsubscribe: <https://lists.ipfire.org/>, <mailto:development+unsubscribe@lists.ipfire.org?subject=unsubscribe> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development+help@lists.ipfire.org?subject=help> Sender: <development@lists.ipfire.org> Mail-Followup-To: <development@lists.ipfire.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
| Series |
tshark: Update to version 4.6.5
|
|
Commit Message
Adolf Belka
30 Apr 2026, 2:05 p.m. UTC
- Update from version 4.6.4 to 4.6.5
- Update of rootfile
- 38 CVE fixes applied
- Changelog
4.6.5
Welcome Page Overhaul
The welcome page has been redesigned to be more informative and easier to
navigate. It now highlights the learning sections better and includes a new
sidebar with tips and tricks for using Wireshark effectively. This feature
can be turned off via the settings dialog.
Bug Fixes
This release fixes quite a few vulnerabilities. This is due to to a recent trend in
AI-assisted vulnerability reports.
wnpa-sec-2026-08 Monero dissector crash. Issue 21066. CVE-2026-5409.
wnpa-sec-2026-09 BT-DHT dissector crash. Issue 21067. CVE-2026-5408.
wnpa-sec-2026-10 FC-SWILS dissector crash. Issue 21070. CVE-2026-5406.
wnpa-sec-2026-11 SMB2 dissector infinite loop. Issue 21073. CVE-2026-5407.
wnpa-sec-2026-12 ICMPv6 dissector crash. Issue 21077. CVE-2026-5299.
wnpa-sec-2026-13 AFP dissector crash. Issue 21088. CVE-2026-5401.
wnpa-sec-2026-14 TLS dissector crash and possible code execution. Issue 21090.
CVE-2026-5402.
wnpa-sec-2026-15 K12 RF5 file parser crash. Issue 21094. CVE-2026-5404.
wnpa-sec-2026-16 SBC codec crash and possible code execution. Issue 21103.
CVE-2026-5403.
wnpa-sec-2026-17 RDP dissector crash and possible code execution. Issue 21105.
CVE-2026-5405.
wnpa-sec-2026-18 AMR-NB codec crash. Issue 21111. CVE-2026-5654.
wnpa-sec-2026-19 SDP dissector crash. Issue 2111. CVE-2026-5655.
wnpa-sec-2026-20 iLBC audio codec crash. Issue 21113. CVE-2026-5657.
wnpa-sec-2026-21 Profile import crash and possible code execution. Issue 21115.
CVE-2026-5656.
wnpa-sec-2026-22 DCP-ETSI protocol dissector crash. Issue 21122. CVE-2026-5653.
wnpa-sec-2026-23 BEEP protocol dissector crash. Issue 21120. CVE-2026-6538.
wnpa-sec-2026-24 ZigBee protocol dissector crash. Issue 21125. CVE-2026-6537.
wnpa-sec-2026-25 DLMS/COSEM protcol dissector infinite loop. Issue 21065.
CVE-2026-6536.
wnpa-sec-2026-26 Dissection engine zlib decompression crash. Issue 21097,
Issue 21098. CVE-2026-6535.
wnpa-sec-2026-27 USB HID protocol dissector infinite loop. Issue 21121.
CVE-2026-6534.
wnpa-sec-2026-28 Dissection engine LZ77 decompression crash. Issue 21127.
CVE-2026-6533.
wnpa-sec-2026-29 Kismet protocol dissector crash. Issue 21129, Issue 21128.
CVE-2026-6532.
wnpa-sec-2026-30 SANE protocol dissector infinite loop. Issue 21139. CVE-2026-6531.
wnpa-sec-2026-31 DCP-ETSI protocol dissector crash. Issue 21144. CVE-2026-6530.
wnpa-sec-2026-32 iLBC audio codec crash. Issue 21145. CVE-2026-6529.
wnpa-sec-2026-33 TLS dissector infinite loop. Issue 21151. CVE-2026-6528.
wnpa-sec-2026-34 ASN.1 PER protocol dissector crash. Issue 21149. CVE-2026-6527.
wnpa-sec-2026-35 RTSP protocol dissector crash. Issue 21173. CVE-2026-6526.
wnpa-sec-2026-36 IEEE 802.11 protocol dissector crash. Issue 21008. CVE-2026-6525.
wnpa-sec-2026-37 MySQL protocol dissector crash. Issue 21172. CVE-2026-6524.
wnpa-sec-2026-38 GNW protocol dissector infinite loop. Issue 21177. CVE-2026-6523.
wnpa-sec-2026-39 OpenFlow v5 protocol dissector infinite loops. Issue 21182,
Issue 21188. CVE-2026-6521.
wnpa-sec-2026-40 OpenFlow v6 protocol dissector infinite loop. Issue 21181.
CVE-2026-6520.
wnpa-sec-2026-41 MBIM dissector infinite loop. Issue 21184. CVE-2026-6519.
wnpa-sec-2026-42 RPKI-Router protocol dissector infinite loop. Issue 21186.
CVE-2026-6522.
wnpa-sec-2026-43 GSM RP protocol dissector crash. Issue 21189. CVE-2026-6870.
wnpa-sec-2026-44 WebSocket protocol dissector crash. Issue 21190. CVE-2026-6869.
wnpa-sec-2026-45 SMB2 protocol dissector crash. Issue 21191.
wnpa-sec-2026-46 HTTP protocol dissector crash. Issue 21185. CVE-2026-6868.
wnpa-sec-2026-47 Sharkd utility memory leak. Issue 21214.
wnpa-sec-2026-48 Sharkd utility crash. Issue 21206.
wnpa-sec-2026-49 Sharkd utility crash. Issue 21207.
wnpa-sec-2026-50 UDS protocol dissector infinite loop. Issue 21225.
The following bugs have been fixed:
WSUG: Enabled Protocols dialog needs an update. Issue 20871.
Build failure with Qt 6.11 beta. Issue 20965.
BLF: Missing 4 byte alignment makes BLF files incompatible with Vector’s tools.
Issue 21017.
SMB2 decryption keys in smb2_seskey_list are not loaded on restart. Issue 21036.
Fuzz job issue: fuzz-2026-03-01-13307044520.pcap. Issue 21049.
Window with a message for ssh_strict_fopen. Issue 21051.
IEEE 1722.1 Dissector for Stream Input Counters displays FRAMES_RX as "Stream
Packets TX" Issue 21055.
Wireshark 4.6.4 crashes. Issue 21058.
Compilation error with Lua-5.5. Issue 21060.
BSOD issue affecting Npcap 1.86. Issue 21062.
Adding descriptions to BLF interfaces broke the Capture File Properties view.
Issue 21069.
Assertion Failure in ws_buffer_remove_start via Malformed Packet Manipulation.
Issue 21078.
Modbus/RTU fails to decode broadcast frames. Issue 21091.
Lua not included unless CMake version >= 3.25. Issue 21093.
sshdump: Regression in v4.6.4 – Failed to resolve hostname aliases from
.ssh/config on Windows. Issue 21114.
Fuzz job crash: fuzz-2026-03-25-13637733472.pcap. Issue 21117.
dumpcap TCP@ section-header parsing remote heap corruption. Issue 21132.
Netflix BBLog EVENT parsing crash. Issue 21133.
On Windows, the Follow Stream feature output is shown in proportional font after
zooming. Issue 21137.
RTP Streams dialog Time of Day inconsistent behavior. Issue 21138.
Sysdig Event Block Integer Underflow. Issue 21140.
RF4CE NWK Dissector Heap Buffer Overflow (crash/OOB) Issue 21150.
NetXray/Sniffer Padding Integer Underflow. Issue 21152.
HTTP/2 ALTSVC/PRIORITY_UPDATE Frame Length Truncation (24-bit to 16-bit) Issue 21155.
Snort config parser 2 buffer overflows. Issue 21165.
ESP NULL Encryption Integer Underflow triggers Heap Overflow. Issue 21166.
Heap buffer overflow in ISO 8583 dissector bin2hex() Issue 21171.
wslua: NULL pointer dereference in get_dissector when passing an invalid GUID
string to an FT_GUID table. Issue 21194.
Fuzz job UTF-8 encoding issue: fuzz-2026-04-16-13947406035.pcap. Issue 21199.
Qt: Waterfall bars misisng in conversation overview when "limit to display filter"
is active. Issue 21204.
text2pcap: heap-buffer-overflow in memmove when -P"dissector" payload exceeds
reserved space. Issue 21208.
text2pcap : Stack overflow via unbounded "g_alloca" in regex "seqno" Issue 21209.
editcap: --novlan integer underflow in sll_remove_vlan_info causes denial of
service on short SLL captures. Issue 21210.
NAS-5GS - Mapping issue between IEI 0x7B and "S-NSSAI location validity
information" IE. Issue 21218.
RTP-MIDI dissector reports incorrect value for MTC Quarter Frame data. Issue 21231.
New and Updated Features
The Windows installers now ship with Npcap 1.87. They previously shipped with
Npcap 1.86.
The Windows installers now ship with Qt 6.10.3. They previously shipped with
Qt 6.9.3.
Updated Protocol Support
AFP, AIN, ANSI_TCAP, ASAM CMP, ATN-ULCS, BEEP, BGP, BT HCI, BT HCI ISO,
BT-DHT, CAMEL, ChargingASE, CMIP, COSEM, DAP, Darwin, DCP ETSI, DECT NR+,
DISP, DMX, DNS, E1AP, E2AP, F1AP, FC-SWILS, Frame, FTAM, GLOW, GNW, GOOSE,
GPRSCDR, GSM MAP, GSM RP, H.225.0, H.245, H.248, H.450, H.450.ROS, HNBAP,
HTTP, HTTP2, ICMPv6, IDMP, IEEE 1609.2, IEEE 1722.1, IEEE 802.11, INAP, IPsec,
IPv4, IPv6, ISAKMP, ISO 8583, ITS, JSON 3GPP, Kismet, LCSAP, LDAP, LPPa, M2AP,
M3AP, MAS-5GS, MBIM, MMS, Modbus, Monero, MySQL, NBAP, NGAP, NRPPa,
OpenFlow 1.4, OpenFlow 1.5, OpenVPN, P1, P22, P7, PCAP, Q932.ROS, QSIG, QUIC,
RANAP, RCv3, RF4CE, RF4CE Profile, RNSAP, RPKI-Router, RRLP, RTPS, RUA, S1AP,
SABP, SANE, SBcAP, SDP, SGP.22, Signal PDU, SMB2, SSH, T.38, TDSUDP, UDS,
WebSocket, X2AP, X509CE, X509IF, X509SAT, XnAP, Z39.50, and ZBD
New and Updated Capture File Support
3gpp phone log, Android Logcat Binary, Android Logcat Text, Ascend, BLF, CAM
Inspector, Catapult DCT2000, Cinco NetXray/Sniffer, CoSine IPSX L2, DBS
Etherwatch, EyeSDN, HP-UX nettl, IBM iSeries, Ixia IxVeriWave, K12, Micropross
mplog, MPEG2 transport stream, NetScaler, NetScreen, pcapng, pppd log,
Sniffer, Systemd Journal, TCPIPtrace, Toshiba Compact ISDN Router, and Visual
Networks
Plugin Development Changes
On UN*X systems (excluding macOS when running from an app bundle, as with the
official installer) extcap binaries are now searched for under the libexec
directory by default, e.g., /usr/libexec/wireshark/extcap instead of
/usr/lib64/wireshark/extcap or similar. This is the customary place for helper
binaries, which as opposed to libraries do not need multiarch support. The
location can be overridden via the environment variable WIRESHARK_EXTCAP_DIR.
The extcap binaries shipped with Wireshark are installed in the new location,
but third party extcaps may need packaging changes. This change was effective
in version 4.6.0, but was not explicitly noted in the release notes
previously. Note that some distributions do not use a libexec directory, such
as Alpine Linux, which does not have multilib support. On such systems extcap
binaries should be in the same location as before.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
---
config/rootfiles/packages/tshark | 4 ++--
lfs/tshark | 6 +++---
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/config/rootfiles/packages/tshark b/config/rootfiles/packages/tshark index 1fbaa5976..b92e3388e 100644 --- a/config/rootfiles/packages/tshark +++ b/config/rootfiles/packages/tshark @@ -11,10 +11,10 @@ usr/bin/dumpcap usr/bin/tshark #usr/lib/libwireshark.so usr/lib/libwireshark.so.19 -usr/lib/libwireshark.so.19.0.4 +usr/lib/libwireshark.so.19.0.5 #usr/lib/libwiretap.so usr/lib/libwiretap.so.16 -usr/lib/libwiretap.so.16.0.4 +usr/lib/libwiretap.so.16.0.5 #usr/lib/libwsutil.so usr/lib/libwsutil.so.17 usr/lib/libwsutil.so.17.0.0 diff --git a/lfs/tshark b/lfs/tshark index c350ceb7c..6d0529802 100644 --- a/lfs/tshark +++ b/lfs/tshark @@ -26,7 +26,7 @@ include Config SUMMARY = A Network Traffic Analyser -VER = 4.6.4 +VER = 4.6.5 THISAPP = wireshark-$(VER) DL_FILE = $(THISAPP).tar.xz @@ -35,7 +35,7 @@ DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = tshark DEPS = c-ares libxxhash -PAK_VER = 34 +PAK_VER = 35 SERVICES = @@ -47,7 +47,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = e08e015d933738c346e5b4d9985efd0953f11d4fed0010ca5b38cd60e983059ca402ac121c142991057fe0ea8586ddc1dfde9e70f9c0d5a90b40dc2d15e80791 +$(DL_FILE)_BLAKE2 = bcb40a93ad72b775b703c9fbab0d33a5ec94372625380c54b4247de3ceb9a807ffdca0fbb4035366cd1a557dd5ddc8a775ab1ab1038467814eaa62efdf448865 install : $(TARGET)