From patchwork Fri Nov 22 15:06:50 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 8273 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4Xvz374fMxz3wx3 for ; Fri, 22 Nov 2024 15:06:59 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "E6" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4Xvz354x7fz2Mg; Fri, 22 Nov 2024 15:06:57 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4Xvz352lr8z342t; Fri, 22 Nov 2024 15:06:57 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4Xvz3257jFz2yTD for ; Fri, 22 Nov 2024 15:06:54 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4Xvz316GrVz12Q; Fri, 22 Nov 2024 15:06:53 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1732288014; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=4W3tyTXMoPpoED3RaURZoBK+9ph0MEiMFvcM0T6Uh9s=; b=Gtab8mpDJHLIf10KzKaqDY0i+pCRHXqrQvE6EUqfPKLqXobVBb9r8ZvzA0dsCyog01JEY9 kBpFTyOX6QHtjXDQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1732288014; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=4W3tyTXMoPpoED3RaURZoBK+9ph0MEiMFvcM0T6Uh9s=; b=jk7dqBvPa9CdJrsxY8RevnJxjwkJX72iqkpWky3uUs8Yu2q3bIZ3/whj2oiTGZ38pkoEQX NE9LknswaHlNyEq9sNYwVN0pjYETrMgLXlF798MeFTVwEBMVdahDSklIvnwhCT9ECpjP6F tbCfmJ0XdSAFKjJ4d1lliWanYc0ifjWTBd8pT4OhH9CK2mlebhwG5hHrEUfRows8/xlc+6 WBiacC8DD34/C+Xm65Kkg6HAEuAOJ89Fs/zWLgR276bjYCH6z1gAFSN0uS5+PU+ySbq9QS B1sfx2JTwlImcnKW0BslZwciydpcRuB3fA8brEjjClNFrSA2CXVTHj7hJgNlfQ== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] tshark: Update to version 4.4.2 Date: Fri, 22 Nov 2024 16:06:50 +0100 Message-ID: <20241122150650.3421506-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: XTUQ6U2DFJON4NCH2FCGF53R4G4KJJFM X-Message-ID-Hash: XTUQ6U2DFJON4NCH2FCGF53R4G4KJJFM X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version 4.4.1 to 4.4.2 - Update of rootfile - Changelog 4.4.2 vulnerabilities fixed: wnpa-sec-2024-14 FiveCo RAP dissector infinite loop. Issue 20176. wnpa-sec-2024-15 ECMP dissector crash. Issue 20214. bugs fixed: CIP I/O is not detected by "enip" filter anymore. Issue 19517. Fuzz job issue: fuzz-2024-09-03-7550.pcap. Issue 20041. OSS-Fuzz 71476: wireshark:fuzzshark_ip_proto-udp: Index-out-of-bounds in DOFObjectID_Create_Unmarshal. Issue 20065. JA4_c hashes an empty field to e3b0c44298fc when it should be 000000000000. Issue 20066. Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone Mirroring. Issue 20082. PTP analysis loses track of message associations in case of sequence number resets. Issue 20099. USB CCID: response packet in case SetParameters command is unsupported is flagged as malformed. Issue 20107. dumpcap crashes when run from TShark with a capture filter. Issue 20108. SRT dissector: The StreamID (SID) in the handshake extension is displayed without regarding the control characters and with NUL as terminating. Issue 20113. Ghost error message on POP3 packets. Issue 20124. Building against c-ares 1.34 fails. Issue 20125. D-Bus is not optional anymore. Issue 20126. macOS Intel DMGs aren’t fully notarized. Issue 20129. Incorrect name for MLD Capabilities and Operations Present flag in dissection of MLD Capabilities for MLO wifi-7 capture. Issue 20134. CQL Malformed Packet v4 S → C Type RESULT: Prepared[Malformed Packet] Issue 20142. Wi-Fi: 256 Block Ack (BA) is not parsed properly. Issue 20156. BACnet ReadPropertyMultiple request Maximum allowed recursion depth reached. Issue 20159. Statistics→I/O Graph crashes when using simple moving average. Issue 20163. HTTP2 body decompression fails on DATA with a single padded frame. Issue 20167. Compiler warning for ui/tap-rtp-common.c (ignoring return value) Issue 20169. SIP dissector bug due to "be-route" param in VIA header. Issue 20173. Coredump after trying to open 'Follow TCP stream' Issue 20174. Protobuf JSON mapping error. Issue 20182. Display filter "!stp.pvst.origvlan in { vlan.id }" causes a crash (Version 4.4.1) Issue 20183. Extcap plugins shipped with Wireshark Portable are not found in version 4.4.1. Issue 20184. IEEE 802.11be: Wrong regulatory info in HE Operation IE in Beacon frame. Issue 20187. Wireshark 4.4.1 does not decode RTCP packets. Issue 20188. Qt: Display filter sub-menu can only be opened on the triangle, not the full name. Issue 20190. Qt: Changing the display filter does not update the Conversations or Endpoints dialogs. Issue 20191. MODBUS Dissector bug. Issue 20192. Modbus dissector bug - Field Occurence and Layer Operator modbus.bitval field. Issue 20193. Wireshark crashes when a field is dragged from packet details towards the find input. Issue 20204. Lua DissectorTable("") : set ("10,11") unexpected behavior in locales with comma as decimal separator. Issue 20216. The TCP dissector no longer falls back to using the client port as a criterion for selecting a payload dissector when the server port does not select a payload dissector (except for port 20, active FTP). This behavior can be changed using the "Client port dissectors" preference. Display filters now correctly handle floating point conversion errors. The Lua API now has better support for comma-separated ranges in different locales. New and Updated Features The TShark syntax for dumping only fields with a certain prefix has changed from -G fields prefix to -G fields,prefix. This allows tshark -G fields to again support also specifying the configuration profile to use. Updated Protocol Support ARTNET, ASN.1 PER, BACapp, BT BR/EDR, CQL, DOF, ECMP, ENIP, FiveCo RAP, Frame, FTDI FT, HSRP, HTTP/2, ICMPv6, IEEE 802.11, MBTCP, MMS, MPEG PES, PN-DCP, POP, ProtoBuf, PTP, RPC, RTCP, SIP, SRT, Syslog, TCP, UMTS RLC, USB CCID, Wi-SUN, and ZigBee ZCL New and Updated Capture File Support BLF Signed-off-by: Adolf Belka --- config/rootfiles/packages/tshark | 4 ++-- lfs/tshark | 18 ++++++++---------- 2 files changed, 10 insertions(+), 12 deletions(-) diff --git a/config/rootfiles/packages/tshark b/config/rootfiles/packages/tshark index 1a2df8938..73b63bda4 100644 --- a/config/rootfiles/packages/tshark +++ b/config/rootfiles/packages/tshark @@ -12,10 +12,10 @@ usr/bin/dumpcap usr/bin/tshark #usr/lib/libwireshark.so usr/lib/libwireshark.so.18 -usr/lib/libwireshark.so.18.0.1 +usr/lib/libwireshark.so.18.0.2 #usr/lib/libwiretap.so usr/lib/libwiretap.so.15 -usr/lib/libwiretap.so.15.0.1 +usr/lib/libwiretap.so.15.0.2 #usr/lib/libwsutil.so usr/lib/libwsutil.so.16 usr/lib/libwsutil.so.16.0.0 diff --git a/lfs/tshark b/lfs/tshark index de079aa8d..a567f03ea 100644 --- a/lfs/tshark +++ b/lfs/tshark @@ -26,7 +26,7 @@ include Config SUMMARY = A Network Traffic Analyser -VER = 4.4.1 +VER = 4.4.2 THISAPP = wireshark-$(VER) DL_FILE = $(THISAPP).tar.xz @@ -35,7 +35,7 @@ DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = tshark DEPS = c-ares -PAK_VER = 19 +PAK_VER = 20 SERVICES = @@ -47,7 +47,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 747ffe14a7b30c4d7bb435bff1fded11efcf03a8bfcacd48d36141fae7a9cfb7965076b1a807d7f095f66bb99148732c090493d2c3654b4a20355f8dbeac3972 +$(DL_FILE)_BLAKE2 = ea5c48f06c2aeb5b51f6ba62fd57214e9dd79917f978867d3ae31ffec74eb82ba7c8a2e2dcba415e53d051e531f9f9907aac88c6f29b6746222cf812bb43c85b install : $(TARGET) @@ -80,15 +80,13 @@ $(subst %,%_BLAKE2,$(objects)) : $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) @$(PREBUILD) @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar Jxf $(DIR_DL)/$(DL_FILE) - cd $(DIR_APP) && mkdir build - cd $(DIR_APP)/build && cmake .. \ - -DBUILD_wireshark=OFF \ - -DCMAKE_INSTALL_PREFIX=/usr \ - -DCMAKE_BUILD_TYPE=Release \ - -DBUILD_mmdbresolve=OFF + cd $(DIR_APP)/build && cmake .. \ + -DBUILD_wireshark=OFF \ + -DCMAKE_INSTALL_PREFIX=/usr \ + -DCMAKE_BUILD_TYPE=Release \ + -DBUILD_mmdbresolve=OFF cd $(DIR_APP)/build && make $(MAKETUNING) cd $(DIR_APP)/build && make install - @rm -rf $(DIR_APP) @$(POSTBUILD)