public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Cc: Adolf Belka <adolf.belka@ipfire.org>
Subject: [PATCH] tshark: Update to version 4.6.4
Date: Fri, 27 Feb 2026 19:18:37 +0100	[thread overview]
Message-ID: <20260227181838.3716442-9-adolf.belka@ipfire.org> (raw)
In-Reply-To: <20260227181838.3716442-1-adolf.belka@ipfire.org>

- Update from version 4.6.3 to 4.6.4
- Update of rootfile
- 3 CVE fixes
- Changelog
    4.6.4
Bug Fixes
    wnpa-sec-2026-05 USB HID dissector memory exhaustion. Issue 20972. CVE-2026-3201.
    wnpa-sec-2026-06 NTS-KE dissector crash. Issue 21000. CVE-2026-3202.
    wnpa-sec-2026-07 RF4CE Profile dissector crash. Issue 21009. CVE-2026-3203.
    Wireshark doesn’t start if Npcap is configured with "Restrict Npcap driver’s
	Access to Administrators only" Issue 20828.
    PQC signature algorithm not reported in signature_algorithms. Issue 20953.
    Unexpected JA4 ALPN values when space characters sent. Issue 20966.
    Expert Info seems to have quadratic performance (gets slower and slower) Issue 20970.
    IKEv2 EMERGENCY_CALL_NUMBERS Notify payload cannot be decoded. Issue 20974.
    TShark and editcap fails with segmentation fault when output format (-F) set to
	blf. Issue 20976.
    Fuzz job crash: fuzz-2026-02-01-12944805400.pcap [Zigbee Direct Tunneling Zigbee
	NWK PDUs NULL hash table] Issue 20977.
    Wiretap writes pcapng custom options with string values invalidly. Issue 20978.
    RDM status in Output Status (GoodOutputB) field incorrectly decoded in Art-Net
	PollReply dissector. Issue 20980.
    Wiretap writes invalid pcapng Darwin option blocks. Issue 20991.
    TDS dissector desynchronizes on RPC DATENTYPE (0x28) due to incorrect expectation
	of TYPE_VARLEN (MaxLen) Issue 21001.
    Only first HTTP POST is parsed inside SOCKS with "Decode As". Issue 21006.
    TShark: Bogus "Dissector bug" messages generated in pipelines where something
	after tshark exits before reading all its input. Issue 21011.
    New Diameter RAT-Types in TS 29.212 not decoded. Issue 21012.
    Malformed packet error on Trigger HE Basic frames. Issue 21032.
Updated Protocol Support
	Art-Net, AT, BGP, GSM DTAP, GSM SIM, IEEE 802.11, IPv6, ISAKMP, MBIM, MySQL,
	 NAS-5GS, NTS-KE, SGP.22, Silabs DCH, Socks, TDS, TECMP, USB HID, ZB TLV, and ZBD
New and Updated Capture File Support
	BLF, pcapng, and TTL

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
---
 config/rootfiles/packages/tshark | 4 ++--
 lfs/tshark                       | 6 +++---
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/config/rootfiles/packages/tshark b/config/rootfiles/packages/tshark
index 6d67fb4ed..1fbaa5976 100644
--- a/config/rootfiles/packages/tshark
+++ b/config/rootfiles/packages/tshark
@@ -11,10 +11,10 @@ usr/bin/dumpcap
 usr/bin/tshark
 #usr/lib/libwireshark.so
 usr/lib/libwireshark.so.19
-usr/lib/libwireshark.so.19.0.3
+usr/lib/libwireshark.so.19.0.4
 #usr/lib/libwiretap.so
 usr/lib/libwiretap.so.16
-usr/lib/libwiretap.so.16.0.3
+usr/lib/libwiretap.so.16.0.4
 #usr/lib/libwsutil.so
 usr/lib/libwsutil.so.17
 usr/lib/libwsutil.so.17.0.0
diff --git a/lfs/tshark b/lfs/tshark
index f3ec2f723..c350ceb7c 100644
--- a/lfs/tshark
+++ b/lfs/tshark
@@ -26,7 +26,7 @@ include Config
 
 SUMMARY    = A Network Traffic Analyser
 
-VER        = 4.6.3
+VER        = 4.6.4
 
 THISAPP    = wireshark-$(VER)
 DL_FILE    = $(THISAPP).tar.xz
@@ -35,7 +35,7 @@ DIR_APP    = $(DIR_SRC)/$(THISAPP)
 TARGET     = $(DIR_INFO)/$(THISAPP)
 PROG       = tshark
 DEPS       = c-ares libxxhash
-PAK_VER    = 33
+PAK_VER    = 34
 
 SERVICES   =
 
@@ -47,7 +47,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_BLAKE2 = 635c2cd0f6298d0e5d5a812e502ccbed7a82ad0c67e144484f99cfe7e94b0dfb07016cddc1e81aef7ec35c945b16b0ad14ba42e7eb216ab1520f56443fd8bf30
+$(DL_FILE)_BLAKE2 = e08e015d933738c346e5b4d9985efd0953f11d4fed0010ca5b38cd60e983059ca402ac121c142991057fe0ea8586ddc1dfde9e70f9c0d5a90b40dc2d15e80791
 
 install : $(TARGET)
 
-- 
2.53.0



  parent reply	other threads:[~2026-02-27 18:18 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-27 18:18 [PATCH] core201: Ship iptables Adolf Belka
2026-02-27 18:18 ` [PATCH] core201: Ship lua Adolf Belka
2026-02-27 18:18 ` [PATCH] core201: Ship wireless-regdb Adolf Belka
2026-02-27 18:18 ` [PATCH] ddrescue: Update to version 1.30 Adolf Belka
2026-02-27 18:18 ` [PATCH] fping: Update to version 5.5 Adolf Belka
2026-02-27 18:18 ` [PATCH] iptables: Update to version 1.8.12 Adolf Belka
2026-02-27 18:18 ` [PATCH] lua: Update to version 5.4.8 Adolf Belka
2026-02-27 18:18 ` [PATCH] minicom: Update to version 2.11 Adolf Belka
2026-02-27 18:18 ` Adolf Belka [this message]
2026-02-27 18:18 ` [PATCH] wireless-regdb: Update to version 2026.02.04 Adolf Belka

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260227181838.3716442-9-adolf.belka@ipfire.org \
    --to=adolf.belka@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox