From patchwork Sat Mar 8 04:49:29 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Axel Lin X-Patchwork-Id: 328150 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from silver.osuosl.org (silver.osuosl.org [140.211.166.136]) by ozlabs.org (Postfix) with ESMTP id 569852C009C for ; Sat, 8 Mar 2014 15:49:38 +1100 (EST) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id A2F3133181; Sat, 8 Mar 2014 04:49:37 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7D9nnX4wC5Ml; Sat, 8 Mar 2014 04:49:35 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by silver.osuosl.org (Postfix) with ESMTP id BBBBB33005; Sat, 8 Mar 2014 04:49:35 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from whitealder.osuosl.org (whitealder.osuosl.org [140.211.166.138]) by ash.osuosl.org (Postfix) with ESMTP id E0ED11BF974 for ; Sat, 8 Mar 2014 04:49:34 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id DC13F8BB15 for ; Sat, 8 Mar 2014 04:49:34 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BXRB0RWwbeaY for ; Sat, 8 Mar 2014 04:49:34 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.7.6 Received: from mail-pa0-f44.google.com (mail-pa0-f44.google.com [209.85.220.44]) by whitealder.osuosl.org (Postfix) with ESMTPS id 0B7EB8BA9B for ; Sat, 8 Mar 2014 04:49:33 +0000 (UTC) Received: by mail-pa0-f44.google.com with SMTP id bj1so5026827pad.31 for ; Fri, 07 Mar 2014 20:49:33 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:message-id:subject:from:to:cc:date:content-type :mime-version:content-transfer-encoding; bh=/isOFovUeLMdRFA/TPRCnkNTTT1m5urOkObolxi13/k=; b=W/D3HKOmOYeizebKiU5XlqcPIGzKgYhReqrOE2GW0tajMFajb1IKHYZlCpwzysvBQa tuAMuVlhsVipOdNS6ynQ2Tvh7CjZjF24bTBKH5Iu12mAdmP0Ej+Xx8ijAEZCGKiUeDEq uFRbc/Jov9xngUhRP788XNUH7HjxWxAhZ9M5spQBGVEto/GSbOcwU3HH3Wm7rcCjGzub asgz2fMHq5+CcsJpqhL7l5XxgB28i1hUImfp+YHHWyQ8pQ6MMVmXWKQqqjW/G6qsbb1K H2x9Mtf8BaoW0pUzNm2WVjmbsDWs3ejXz8ms84VwuFyXFhTHOqLWUyT68PhGi8IY8FvD LsSQ== X-Gm-Message-State: ALoCoQkgTlIYe64/C4D/8BvsVU+3s/Ja+t2mLlvqaggaK665x8LJmyncefTl4skwK49zeoa7gyKv X-Received: by 10.68.244.8 with SMTP id xc8mr26571464pbc.164.1394254173496; Fri, 07 Mar 2014 20:49:33 -0800 (PST) Received: from [192.168.0.102] (218-164-148-38.dynamic.hinet.net. [218.164.148.38]) by mx.google.com with ESMTPSA id oz7sm43412220pbc.41.2014.03.07.20.49.31 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 07 Mar 2014 20:49:32 -0800 (PST) Message-ID: <1394254169.27904.1.camel@phoenix> From: Axel Lin To: Peter Korsgaard Date: Sat, 08 Mar 2014 12:49:29 +0800 X-Mailer: Evolution 3.6.4-0ubuntu1 Mime-Version: 1.0 Cc: buildroot@busybox.net Subject: [Buildroot] [PATCH] wireshark: bump to version 1.10.6 X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: buildroot-bounces@busybox.net Sender: buildroot-bounces@busybox.net The following vulnerabilities have been fixed. * [1]wnpa-sec-2014-01 The NFS dissector could crash. Discovered by Moshe Kaplan. ([2]Bug 9672) Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12 [3]CVE-2014-2281 * [4]wnpa-sec-2014-02 The M3UA dissector could crash. Discovered by Laurent Butti. ([5]Bug 9699) Versions affected: 1.10.0 to 1.10.5 [6]CVE-2014-2282 * [7]wnpa-sec-2014-03 The RLC dissector could crash. ([8]Bug 9730) Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12 [9]CVE-2014-2283 * [10]wnpa-sec-2014-04 The MPEG file parser could overflow a buffer. Discovered by Wesley Neelen. ([11]Bug 9843) Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12 [12]CVE-2014-2299 Signed-off-by: Axel Lin --- package/wireshark/wireshark.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/package/wireshark/wireshark.mk b/package/wireshark/wireshark.mk index 1944b08..62dad8a 100644 --- a/package/wireshark/wireshark.mk +++ b/package/wireshark/wireshark.mk @@ -4,7 +4,7 @@ # ################################################################################ -WIRESHARK_VERSION = 1.10.5 +WIRESHARK_VERSION = 1.10.6 WIRESHARK_SOURCE = wireshark-$(WIRESHARK_VERSION).tar.bz2 WIRESHARK_SITE = http://www.wireshark.org/download/src/all-versions WIRESHARK_LICENSE = wireshark license