

DIS: Malformed packet in SISO-STD-002 transmitter. ieee80211-radio.c preamble duration calculation not correct. Newline "\n" in packet list field increase line height for all rows.

#6028 RPC_NETLOGON: Direct-leak in g_malloc (generate_hash_key). NetScaler RPC segmentation fault / stack overflow. Unable to create Filter Expression Button for a yellow filter. GET MAX LUN wLength decoded as big-endian - USB Mass Storage.

BOOTP/DHCP: malformed packet ? when user class option (77) is present. The following bugs have been fixed: Change placement of "double chevron" in Filter Toolbar to eliminate overlap. All ASN.1 BER dissectors, along with the DICOM, DMP, LLTD, OpenFlow, RELOAD, RPCoRDMA, RPKI-Router, S7COMM, SCCP, Thread, Thrift, USB, and WCCP dissectors were susceptible. Multiple dissectors could go into large infinite loops. The following vulnerabilities have been fixed: The IEEE 802.11 dissector could crash.
