Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package wireshark for openSUSE:Factory checked in at 2026-05-04 12:48:36 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/wireshark (Old) and /work/SRC/openSUSE:Factory/.wireshark.new.30200 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "wireshark" Mon May 4 12:48:36 2026 rev:248 rq:1350246 version:4.6.5 Changes: -------- --- /work/SRC/openSUSE:Factory/wireshark/wireshark.changes 2026-02-27 17:02:39.058066913 +0100 +++ /work/SRC/openSUSE:Factory/.wireshark.new.30200/wireshark.changes 2026-05-04 12:49:39.439944610 +0200 @@ -1,0 +2,50 @@ +Thu Apr 30 07:11:01 UTC 2026 - Robert Frohl <[email protected]> + +- Wireshark 4.6.5 + * CVE-2026-5409: Monero dissector crash (bsc#1263751). + * CVE-2026-5408: BT-DHT dissector crash (bsc#1263752). + * CVE-2026-5406: FC-SWILS dissector crash (bsc#1263754). + * CVE-2026-5407: SMB2 dissector infinite loop (bsc#1263753). + * CVE-2026-5299: ICMPv6 dissector crash (bsc#1263757). + * CVE-2026-5401: AFP dissector crash (bsc#1263756). + * CVE-2026-5402: TLS dissector crash and possible code execution (bsc#1263755). + * CVE-2026-5404: K12 RF5 file parser crash (bsc#1263766). + * CVE-2026-5403: SBC codec crash and possible code execution (bsc#1263765). + * CVE-2026-5405: RDP dissector crash and possible code execution (bsc#1263767). + * CVE-2026-5654: AMR-NB codec crash (bsc#1263749). + * CVE-2026-5655: SDP dissector crash (bsc#1263748). + * CVE-2026-5657: iLBC audio codec crash (bsc#1263747). + * CVE-2026-5656: Profile import crash and possible code execution (bsc#1263809). + * CVE-2026-5653: DCP-ETSI protocol dissector crash (bsc#1263750). + * CVE-2026-6538: BEEP protocol dissector crash (bsc#1263728). + * CVE-2026-6537: ZigBee protocol dissector crash (bsc#1263729). + * CVE-2026-6536: DLMS/COSEM protcol dissector infinite loop (bsc#1263730). + * CVE-2026-6535: Dissection engine zlib decompression crash (bsc#1263731). + * CVE-2026-6534: USB HID protocol dissector infinite loop (bsc#1263732). + * CVE-2026-6533: Dissection engine LZ77 decompression crash (bsc#1263733). + * CVE-2026-6532: Kismet protocol dissector crash (bsc#1263734). + * CVE-2026-6531: SANE protocol dissector infinite loop (bsc#1263735). + * CVE-2026-6530: DCP-ETSI protocol dissector crash (bsc#1263736). + * CVE-2026-6529: iLBC audio codec crash (bsc#1263737). + * CVE-2026-6528: TLS dissector infinite loop (bsc#1263738). + * CVE-2026-6527: ASN.1 PER protocol dissector crash (bsc#1263739). + * CVE-2026-6526: RTSP protocol dissector crash (bsc#1263740). + * CVE-2026-6525: IEEE 802.11 protocol dissector crash (bsc#1263810). + * CVE-2026-6524: MySQL protocol dissector crash (bsc#1263741). + * CVE-2026-6523: GNW protocol dissector infinite loop (bsc#1263742). + * CVE-2026-6521: OpenFlow v5 protocol dissector infinite loops (bsc#1263744). + * CVE-2026-6520: OpenFlow v6 protocol dissector infinite loop (bsc#1263745). + * CVE-2026-6519: MBIM dissector infinite loop (bsc#1263746). + * CVE-2026-6522: RPKI-Router protocol dissector infinite loop (bsc#1263743). + * CVE-2026-6870: GSM RP protocol dissector crash (bsc#1263725). + * CVE-2026-6869: WebSocket protocol dissector crash (bsc#1263726). + * CVE-2026-6867: SMB2 protocol dissector crash (bsc#1263727) + * CVE-2026-6868: HTTP protocol dissector crash (bsc#1263762). + * CVE-2026-7379: Sharkd utility memory leak (bsc#1263758). + * CVE-2026-7376: Sharkd utility crash (bsc#1263760). + * CVE-2026-7378: Sharkd utility crash (bsc#1263759). + * CVE-2026-7375: UDS protocol dissector infinite loop (bsc#1263761). +- Many more features, bug fixes and updated protocol support as listed in: + https://www.wireshark.org/docs/relnotes/wireshark-4.6.5.html + +------------------------------------------------------------------- Old: ---- wireshark-4.6.4.tar.xz wireshark-4.6.4.tar.xz.hash New: ---- wireshark-4.6.5.tar.xz wireshark-4.6.5.tar.xz.hash ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wireshark.spec ++++++ --- /var/tmp/diff_new_pack.xpPZsF/_old 2026-05-04 12:49:41.816042443 +0200 +++ /var/tmp/diff_new_pack.xpPZsF/_new 2026-05-04 12:49:41.844043596 +0200 @@ -34,7 +34,7 @@ %bcond_with qt6 %endif Name: wireshark -Version: 4.6.4 +Version: 4.6.5 Release: 0 Summary: A Network Traffic Analyser License: GPL-2.0-or-later AND GPL-3.0-or-later ++++++ _scmsync.obsinfo ++++++ --- /var/tmp/diff_new_pack.xpPZsF/_old 2026-05-04 12:49:42.136055620 +0200 +++ /var/tmp/diff_new_pack.xpPZsF/_new 2026-05-04 12:49:42.176057267 +0200 @@ -1,4 +1,4 @@ -mtime: 1772101351 -commit: 50758bff798533f430b298eea2c00d48f17c088070a745510e42767664237b88 +mtime: 1777550267 +commit: 05247c0bd02e3a280fc2b0628c1f9a855d8da8890608ab7ccfe9bcd02f50e4de url: https://src.opensuse.org/rfrohl/wireshark ++++++ build.specials.obscpio ++++++ ++++++ build.specials.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/.gitignore new/.gitignore --- old/.gitignore 1970-01-01 01:00:00.000000000 +0100 +++ new/.gitignore 2026-04-30 13:57:47.000000000 +0200 @@ -0,0 +1 @@ +.osc ++++++ wireshark-4.6.4.tar.xz -> wireshark-4.6.5.tar.xz ++++++ /work/SRC/openSUSE:Factory/wireshark/wireshark-4.6.4.tar.xz /work/SRC/openSUSE:Factory/.wireshark.new.30200/wireshark-4.6.5.tar.xz differ: char 15, line 1 ++++++ wireshark-4.6.4.tar.xz.hash -> wireshark-4.6.5.tar.xz.hash ++++++ --- /work/SRC/openSUSE:Factory/wireshark/wireshark-4.6.4.tar.xz.hash 2026-02-27 17:02:38.442041349 +0100 +++ /work/SRC/openSUSE:Factory/.wireshark.new.30200/wireshark-4.6.5.tar.xz.hash 2026-05-04 12:49:39.379942140 +0200 @@ -1,29 +1,29 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -wireshark-4.6.4.tar.xz: 50566640 bytes -SHA256(wireshark-4.6.4.tar.xz)=fbeab3d85c6c8a5763c8d9b7fe20b5c69ca9f9e7f2b824bedc73135bdca332e2 -SHA1(wireshark-4.6.4.tar.xz)=694a28aedceef0061736d13c7fdff0ebddc46e77 - -Wireshark-4.6.4-arm64.exe: 75661432 bytes -SHA256(Wireshark-4.6.4-arm64.exe)=62a0d34efb4418fe373b8f56a13457ff488c827d8c7d7f48e3037e52752bee6f -SHA1(Wireshark-4.6.4-arm64.exe)=ebf0381942f21c816f0098351eed8147236a106d - -Wireshark-4.6.4-x64.exe: 96981632 bytes -SHA256(Wireshark-4.6.4-x64.exe)=102017d8e99a75b57895cd2144e6a61dc335a8ff14c7a25bd83a55f8ea9ad77b -SHA1(Wireshark-4.6.4-x64.exe)=d759080d59d100e40db2b40a4279b465d13ba1f6 - -Wireshark-4.6.4-x64.msi: 73871360 bytes -SHA256(Wireshark-4.6.4-x64.msi)=e233387deeac2693cd9edc73a9a1578338ae211669f01f5dfb99a119a4f5ff9a -SHA1(Wireshark-4.6.4-x64.msi)=398e3edca8e56a1d03560a6dca418f0ac9d0eddd - -WiresharkPortable64_4.6.4.paf.exe: 95895416 bytes -SHA256(WiresharkPortable64_4.6.4.paf.exe)=2f144183e24d14c3573053b85e304819a5409399383a3f3f6b2feac5e36d1dbb -SHA1(WiresharkPortable64_4.6.4.paf.exe)=a53bc99a82d0e2518480ff46d5159651178ba562 - -Wireshark 4.6.4.dmg: 141797826 bytes -SHA256(Wireshark 4.6.4.dmg)=08150f79cfc5828820f991b6d944c68536db9595b1c3052982bbde79fb2053df -SHA1(Wireshark 4.6.4.dmg)=ce758a8ff597e3d4340a06bfe286cecea465bc7e +wireshark-4.6.5.tar.xz: 58257076 bytes +SHA256(wireshark-4.6.5.tar.xz)=b5322538b20fa3e0bf004be83c534a42937d442be3f960d01b4e1f0db6c50386 +SHA1(wireshark-4.6.5.tar.xz)=5e1e564676b4c52993bc4c29f3014517d672ee3d + +Wireshark-4.6.5-arm64.exe: 83484928 bytes +SHA256(Wireshark-4.6.5-arm64.exe)=8231f23309229f3a18d7087858098a73b3a76595a672f8b3f0e678351e78e89a +SHA1(Wireshark-4.6.5-arm64.exe)=ff40a7bfa95e241c31f1fd0e5c8f5158f663fcd6 + +Wireshark-4.6.5-x64.exe: 104913040 bytes +SHA256(Wireshark-4.6.5-x64.exe)=3c3a2f020d5e053514eefa30dde49e596b857edef6971b655bdfd09af504b0f6 +SHA1(Wireshark-4.6.5-x64.exe)=1fb75783206e5ba13888a3b7964b0475eb91242c + +Wireshark-4.6.5-x64.msi: 81883136 bytes +SHA256(Wireshark-4.6.5-x64.msi)=4e10774e14132a8507163d43fad98a61aa52d8eada00fa85ae717b3494623cbe +SHA1(Wireshark-4.6.5-x64.msi)=75dd1e0d1d2594e9536e66e851ad366d22d53341 + +WiresharkPortable64_4.6.5.paf.exe: 111517432 bytes +SHA256(WiresharkPortable64_4.6.5.paf.exe)=093dede2c87825d7ed3d06a1e806ba03f647c2b26f85fb207067dd7c7ccf29f3 +SHA1(WiresharkPortable64_4.6.5.paf.exe)=91c75085f4c9c198adde75ba6734bf195ffac0a3 + +Wireshark 4.6.5.dmg: 151276730 bytes +SHA256(Wireshark 4.6.5.dmg)=9e83253bc59ffee2d7050a4e4b7bd390d216d38042ef7740305eea7ce59eee48 +SHA1(Wireshark 4.6.5.dmg)=126f07f2c4b531c3e5a7f87f566d3a35c97f39f7 You can validate these hashes using the following commands (among others): @@ -33,17 +33,18 @@ Other: openssl sha256 wireshark-x.y.z.tar.xz -----BEGIN PGP SIGNATURE----- -iQIzBAEBCgAdFiEEWlrbp9vqbD+HIk8ZgiRKeOb+ruoFAmmfXmsACgkQgiRKeOb+ -ruq+JBAA2qBy0xs3H2o59HXCOuncE153TvBVsRVet8F6FBo0LRSADfoJRKFsItmJ -jQjEukygi8EtmFmKrK4vQ4mT6gtQc8+d0qpJYSf9sFSH1iUrFgAEfoJhdM5bb6Kz -bdM2NmHRsPVbgYgxbVI+XqclwhxQ0+3MRbsIIr6VImKfoz7LFySig8IpK8jOz1b0 -32/CPkUyfJvXM8SgTbXItLELcUDUqpe1CnAPdmUp1LR7+fGzfPrGlZPiyWQKNEOG -mzTOrbnuqvNx+VgKSrWZXX00F3S6yOcUTLoX77x+2fAqXItdrgrqiLmBO9i1DiwF -G2ahiSSjTf2NZunzaBqfEOxKngWSLlv3H+XMP70crwJkebfDKsufExvObCJ6oTkm -loOIkhpZIeIukK1ativAnNDTL5QcEcVlC09LojKQDcv2ppd7r7ogi31mXA18CMIN -UQsvZRDFa0gVj3OVKWv1xKNN3HGy/EtfaDCCnqsCWaNSL0QYJ7ugpPV7TV/yFQTv -NQW75pPqyJGcjOUMWjCGaai3O6YOy0iz4jpgTf8nkTaxqESggWjUCcmhrs9Vcmra -5pCo88YsAnijmfFEbSz19YAwidQ+aant531WNui4VFqdzZR4fS62Pi7Hq2eBUGoK -ujLiC/+vbXxVhb+mYrdiIHMyAZbr2GntuJ4++P0uRFkv0QkejCk= -=jIku +iQJPBAEBCgA5FiEEWlrbp9vqbD+HIk8ZgiRKeOb+ruoFAmnynTwbFIAAAAAABAAO +bWFudTIsMi41KzEuMTIsMCwzAAoJEIIkSnjm/q7qQW4P/Re1YiUgF0iXCJQ1tEfm +XMsOOsU7kcTII7OIECbso//qn5RD/JrVwFLoH70urQqbx4UMlCUxt/dfHfwcctHW +GvvypEwrZTJCo9ZsQSFTaTMk0fJh3eZHNPWEw1lSeXb6CvVaoNKiacaI/jP4hkJU +qfaxGQLw106MmXbl7RxMC4aZp6EBMGnvuF75btcYWFFUYyWRRucGS3X3VyP+4QDx +9mUOnHbdtugJQR9VJixWiEQrHF/tIIbCfVoqjixfTm5MqWAg8fGlntdEyUC/LxLV +Bn49zFTWFL5BdnbZWG1NSWi9gTk4FC/PPOXphLK4FjJnwwFKjBBqPnFPrvO8Yj3L +QKTsjjDkblyszZD/Rosq14s6BX5yAfkkC4i0XLrkCYrt5Yy4/OSA3N7Nf169/8Nj +gxu58/pBGVSHp4qyVEF8Qp1/szJJgVZjBtYagvcUZfTkbo+kEylJ0Ry8J2Ar04lb +MHtaC43NkQIGrIcjiZhIwgA2ilVxTy8rxoD7+hrx27OlUjy8Jh2irjc/F3QLM/2B +wt+yVTDh/6EtP65C0B9O2UoawcZnMivIDV+HlnfO0D+pfzxL3v2WLvGyRvPIg31Q +zVpDiksf0qNvgUvnh6c8oahzHLKfqmuIn2KWM79WAkyCm6AuuJlBktVKRhpkYdUd +RKmIIgKNHx6xGMC7+e49SYEn +=nuMV -----END PGP SIGNATURE-----
