Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package wireshark for openSUSE:Factory 
checked in at 2026-05-04 12:48:36
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/wireshark (Old)
 and      /work/SRC/openSUSE:Factory/.wireshark.new.30200 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "wireshark"

Mon May  4 12:48:36 2026 rev:248 rq:1350246 version:4.6.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/wireshark/wireshark.changes      2026-02-27 
17:02:39.058066913 +0100
+++ /work/SRC/openSUSE:Factory/.wireshark.new.30200/wireshark.changes   
2026-05-04 12:49:39.439944610 +0200
@@ -1,0 +2,50 @@
+Thu Apr 30 07:11:01 UTC 2026 - Robert Frohl <[email protected]>
+
+- Wireshark 4.6.5
+  * CVE-2026-5409: Monero dissector crash (bsc#1263751).
+  * CVE-2026-5408: BT-DHT dissector crash (bsc#1263752).
+  * CVE-2026-5406: FC-SWILS dissector crash (bsc#1263754).
+  * CVE-2026-5407: SMB2 dissector infinite loop (bsc#1263753).
+  * CVE-2026-5299: ICMPv6 dissector crash (bsc#1263757).
+  * CVE-2026-5401: AFP dissector crash (bsc#1263756).
+  * CVE-2026-5402: TLS dissector crash and possible code execution 
(bsc#1263755).
+  * CVE-2026-5404: K12 RF5 file parser crash (bsc#1263766).
+  * CVE-2026-5403: SBC codec crash and possible code execution (bsc#1263765).
+  * CVE-2026-5405: RDP dissector crash and possible code execution 
(bsc#1263767).
+  * CVE-2026-5654: AMR-NB codec crash (bsc#1263749).
+  * CVE-2026-5655: SDP dissector crash (bsc#1263748).
+  * CVE-2026-5657: iLBC audio codec crash (bsc#1263747).
+  * CVE-2026-5656: Profile import crash and possible code execution 
(bsc#1263809).
+  * CVE-2026-5653: DCP-ETSI protocol dissector crash (bsc#1263750).
+  * CVE-2026-6538: BEEP protocol dissector crash (bsc#1263728).
+  * CVE-2026-6537: ZigBee protocol dissector crash (bsc#1263729).
+  * CVE-2026-6536: DLMS/COSEM protcol dissector infinite loop (bsc#1263730).
+  * CVE-2026-6535: Dissection engine zlib decompression crash (bsc#1263731).
+  * CVE-2026-6534: USB HID protocol dissector infinite loop (bsc#1263732).
+  * CVE-2026-6533: Dissection engine LZ77 decompression crash (bsc#1263733).
+  * CVE-2026-6532: Kismet protocol dissector crash (bsc#1263734).
+  * CVE-2026-6531: SANE protocol dissector infinite loop (bsc#1263735).
+  * CVE-2026-6530: DCP-ETSI protocol dissector crash (bsc#1263736).
+  * CVE-2026-6529: iLBC audio codec crash (bsc#1263737).
+  * CVE-2026-6528: TLS dissector infinite loop (bsc#1263738).
+  * CVE-2026-6527: ASN.1 PER protocol dissector crash (bsc#1263739).
+  * CVE-2026-6526: RTSP protocol dissector crash (bsc#1263740).
+  * CVE-2026-6525: IEEE 802.11 protocol dissector crash (bsc#1263810).
+  * CVE-2026-6524: MySQL protocol dissector crash (bsc#1263741).
+  * CVE-2026-6523: GNW protocol dissector infinite loop (bsc#1263742).
+  * CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops (bsc#1263744).
+  * CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop (bsc#1263745).
+  * CVE-2026-6519: MBIM dissector infinite loop (bsc#1263746).
+  * CVE-2026-6522: RPKI-Router protocol dissector infinite loop (bsc#1263743).
+  * CVE-2026-6870: GSM RP protocol dissector crash (bsc#1263725).
+  * CVE-2026-6869: WebSocket protocol dissector crash (bsc#1263726).
+  * CVE-2026-6867: SMB2 protocol dissector crash (bsc#1263727)
+  * CVE-2026-6868: HTTP protocol dissector crash (bsc#1263762).
+  * CVE-2026-7379: Sharkd utility memory leak (bsc#1263758).
+  * CVE-2026-7376: Sharkd utility crash (bsc#1263760).
+  * CVE-2026-7378: Sharkd utility crash (bsc#1263759).
+  * CVE-2026-7375: UDS protocol dissector infinite loop (bsc#1263761).
+- Many more features, bug fixes and updated protocol support as listed in:
+  https://www.wireshark.org/docs/relnotes/wireshark-4.6.5.html
+
+-------------------------------------------------------------------

Old:
----
  wireshark-4.6.4.tar.xz
  wireshark-4.6.4.tar.xz.hash

New:
----
  wireshark-4.6.5.tar.xz
  wireshark-4.6.5.tar.xz.hash

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ wireshark.spec ++++++
--- /var/tmp/diff_new_pack.xpPZsF/_old  2026-05-04 12:49:41.816042443 +0200
+++ /var/tmp/diff_new_pack.xpPZsF/_new  2026-05-04 12:49:41.844043596 +0200
@@ -34,7 +34,7 @@
 %bcond_with qt6
 %endif
 Name:           wireshark
-Version:        4.6.4
+Version:        4.6.5
 Release:        0
 Summary:        A Network Traffic Analyser
 License:        GPL-2.0-or-later AND GPL-3.0-or-later

++++++ _scmsync.obsinfo ++++++
--- /var/tmp/diff_new_pack.xpPZsF/_old  2026-05-04 12:49:42.136055620 +0200
+++ /var/tmp/diff_new_pack.xpPZsF/_new  2026-05-04 12:49:42.176057267 +0200
@@ -1,4 +1,4 @@
-mtime: 1772101351
-commit: 50758bff798533f430b298eea2c00d48f17c088070a745510e42767664237b88
+mtime: 1777550267
+commit: 05247c0bd02e3a280fc2b0628c1f9a855d8da8890608ab7ccfe9bcd02f50e4de
 url: https://src.opensuse.org/rfrohl/wireshark
 

++++++ build.specials.obscpio ++++++

++++++ build.specials.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/.gitignore new/.gitignore
--- old/.gitignore      1970-01-01 01:00:00.000000000 +0100
+++ new/.gitignore      2026-04-30 13:57:47.000000000 +0200
@@ -0,0 +1 @@
+.osc

++++++ wireshark-4.6.4.tar.xz -> wireshark-4.6.5.tar.xz ++++++
/work/SRC/openSUSE:Factory/wireshark/wireshark-4.6.4.tar.xz 
/work/SRC/openSUSE:Factory/.wireshark.new.30200/wireshark-4.6.5.tar.xz differ: 
char 15, line 1

++++++ wireshark-4.6.4.tar.xz.hash -> wireshark-4.6.5.tar.xz.hash ++++++
--- /work/SRC/openSUSE:Factory/wireshark/wireshark-4.6.4.tar.xz.hash    
2026-02-27 17:02:38.442041349 +0100
+++ /work/SRC/openSUSE:Factory/.wireshark.new.30200/wireshark-4.6.5.tar.xz.hash 
2026-05-04 12:49:39.379942140 +0200
@@ -1,29 +1,29 @@
 -----BEGIN PGP SIGNED MESSAGE-----
 Hash: SHA512
 
-wireshark-4.6.4.tar.xz: 50566640 bytes
-SHA256(wireshark-4.6.4.tar.xz)=fbeab3d85c6c8a5763c8d9b7fe20b5c69ca9f9e7f2b824bedc73135bdca332e2
-SHA1(wireshark-4.6.4.tar.xz)=694a28aedceef0061736d13c7fdff0ebddc46e77
-
-Wireshark-4.6.4-arm64.exe: 75661432 bytes
-SHA256(Wireshark-4.6.4-arm64.exe)=62a0d34efb4418fe373b8f56a13457ff488c827d8c7d7f48e3037e52752bee6f
-SHA1(Wireshark-4.6.4-arm64.exe)=ebf0381942f21c816f0098351eed8147236a106d
-
-Wireshark-4.6.4-x64.exe: 96981632 bytes
-SHA256(Wireshark-4.6.4-x64.exe)=102017d8e99a75b57895cd2144e6a61dc335a8ff14c7a25bd83a55f8ea9ad77b
-SHA1(Wireshark-4.6.4-x64.exe)=d759080d59d100e40db2b40a4279b465d13ba1f6
-
-Wireshark-4.6.4-x64.msi: 73871360 bytes
-SHA256(Wireshark-4.6.4-x64.msi)=e233387deeac2693cd9edc73a9a1578338ae211669f01f5dfb99a119a4f5ff9a
-SHA1(Wireshark-4.6.4-x64.msi)=398e3edca8e56a1d03560a6dca418f0ac9d0eddd
-
-WiresharkPortable64_4.6.4.paf.exe: 95895416 bytes
-SHA256(WiresharkPortable64_4.6.4.paf.exe)=2f144183e24d14c3573053b85e304819a5409399383a3f3f6b2feac5e36d1dbb
-SHA1(WiresharkPortable64_4.6.4.paf.exe)=a53bc99a82d0e2518480ff46d5159651178ba562
-
-Wireshark 4.6.4.dmg: 141797826 bytes
-SHA256(Wireshark 
4.6.4.dmg)=08150f79cfc5828820f991b6d944c68536db9595b1c3052982bbde79fb2053df
-SHA1(Wireshark 4.6.4.dmg)=ce758a8ff597e3d4340a06bfe286cecea465bc7e
+wireshark-4.6.5.tar.xz: 58257076 bytes
+SHA256(wireshark-4.6.5.tar.xz)=b5322538b20fa3e0bf004be83c534a42937d442be3f960d01b4e1f0db6c50386
+SHA1(wireshark-4.6.5.tar.xz)=5e1e564676b4c52993bc4c29f3014517d672ee3d
+
+Wireshark-4.6.5-arm64.exe: 83484928 bytes
+SHA256(Wireshark-4.6.5-arm64.exe)=8231f23309229f3a18d7087858098a73b3a76595a672f8b3f0e678351e78e89a
+SHA1(Wireshark-4.6.5-arm64.exe)=ff40a7bfa95e241c31f1fd0e5c8f5158f663fcd6
+
+Wireshark-4.6.5-x64.exe: 104913040 bytes
+SHA256(Wireshark-4.6.5-x64.exe)=3c3a2f020d5e053514eefa30dde49e596b857edef6971b655bdfd09af504b0f6
+SHA1(Wireshark-4.6.5-x64.exe)=1fb75783206e5ba13888a3b7964b0475eb91242c
+
+Wireshark-4.6.5-x64.msi: 81883136 bytes
+SHA256(Wireshark-4.6.5-x64.msi)=4e10774e14132a8507163d43fad98a61aa52d8eada00fa85ae717b3494623cbe
+SHA1(Wireshark-4.6.5-x64.msi)=75dd1e0d1d2594e9536e66e851ad366d22d53341
+
+WiresharkPortable64_4.6.5.paf.exe: 111517432 bytes
+SHA256(WiresharkPortable64_4.6.5.paf.exe)=093dede2c87825d7ed3d06a1e806ba03f647c2b26f85fb207067dd7c7ccf29f3
+SHA1(WiresharkPortable64_4.6.5.paf.exe)=91c75085f4c9c198adde75ba6734bf195ffac0a3
+
+Wireshark 4.6.5.dmg: 151276730 bytes
+SHA256(Wireshark 
4.6.5.dmg)=9e83253bc59ffee2d7050a4e4b7bd390d216d38042ef7740305eea7ce59eee48
+SHA1(Wireshark 4.6.5.dmg)=126f07f2c4b531c3e5a7f87f566d3a35c97f39f7
 
 You can validate these hashes using the following commands (among others):
 
@@ -33,17 +33,18 @@
     Other: openssl sha256 wireshark-x.y.z.tar.xz
 -----BEGIN PGP SIGNATURE-----
 
-iQIzBAEBCgAdFiEEWlrbp9vqbD+HIk8ZgiRKeOb+ruoFAmmfXmsACgkQgiRKeOb+
-ruq+JBAA2qBy0xs3H2o59HXCOuncE153TvBVsRVet8F6FBo0LRSADfoJRKFsItmJ
-jQjEukygi8EtmFmKrK4vQ4mT6gtQc8+d0qpJYSf9sFSH1iUrFgAEfoJhdM5bb6Kz
-bdM2NmHRsPVbgYgxbVI+XqclwhxQ0+3MRbsIIr6VImKfoz7LFySig8IpK8jOz1b0
-32/CPkUyfJvXM8SgTbXItLELcUDUqpe1CnAPdmUp1LR7+fGzfPrGlZPiyWQKNEOG
-mzTOrbnuqvNx+VgKSrWZXX00F3S6yOcUTLoX77x+2fAqXItdrgrqiLmBO9i1DiwF
-G2ahiSSjTf2NZunzaBqfEOxKngWSLlv3H+XMP70crwJkebfDKsufExvObCJ6oTkm
-loOIkhpZIeIukK1ativAnNDTL5QcEcVlC09LojKQDcv2ppd7r7ogi31mXA18CMIN
-UQsvZRDFa0gVj3OVKWv1xKNN3HGy/EtfaDCCnqsCWaNSL0QYJ7ugpPV7TV/yFQTv
-NQW75pPqyJGcjOUMWjCGaai3O6YOy0iz4jpgTf8nkTaxqESggWjUCcmhrs9Vcmra
-5pCo88YsAnijmfFEbSz19YAwidQ+aant531WNui4VFqdzZR4fS62Pi7Hq2eBUGoK
-ujLiC/+vbXxVhb+mYrdiIHMyAZbr2GntuJ4++P0uRFkv0QkejCk=
-=jIku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+=nuMV
 -----END PGP SIGNATURE-----

Reply via email to