aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--config.nmake4
-rw-r--r--configure.in2
-rw-r--r--docbook/release-notes.xml12
3 files changed, 13 insertions, 5 deletions
diff --git a/config.nmake b/config.nmake
index 1d6a57b6b8..6cf88371ce 100644
--- a/config.nmake
+++ b/config.nmake
@@ -4,7 +4,7 @@
# in the file README.win32.
# The current Ethereal version
-VERSION=0.10.13
+VERSION=0.10.14
#
# The RC_VERSION should be comma-separated, not dot-separated,
@@ -17,7 +17,7 @@ VERSION=0.10.13
# number to be correctly displayed in the explorer properties dialog
# for the executables, and XP's tooltip, rather than 0.0.0.0."
#
-RC_VERSION=0,10,13
+RC_VERSION=0,10,14
# The version of the wiretap library
WTAP_VERSION=0.3
diff --git a/configure.in b/configure.in
index 0256e6ae05..cabd6fc37d 100644
--- a/configure.in
+++ b/configure.in
@@ -8,7 +8,7 @@ dnl Check for CPU / vendor / OS
AC_CANONICAL_HOST
AC_CANONICAL_TARGET
-AM_INIT_AUTOMAKE(ethereal, 0.10.13)
+AM_INIT_AUTOMAKE(ethereal, 0.10.14)
AM_DISABLE_STATIC
diff --git a/docbook/release-notes.xml b/docbook/release-notes.xml
index 85f6f82ede..d9fc233ea0 100644
--- a/docbook/release-notes.xml
+++ b/docbook/release-notes.xml
@@ -20,7 +20,7 @@ DOCUMENT SECTION
<!--
Ethereal Info
-->
- <!ENTITY EtherealCurrentVersion "0.10.14pre1">
+ <!ENTITY EtherealCurrentVersion "0.10.14">
<!ENTITY EtherealWebSite "http://www.ethereal.com">
<!ENTITY EtherealUsersGuidePage "&EtherealWebSite;/docs/#usersguide">
<!ENTITY EtherealDownloadPage "&EtherealWebSite;/download.html">
@@ -67,7 +67,7 @@ Gnu info
<section id="WhatsNew"><title>What's New</title>
<section><title>Bug Fixes</title>
<para>
- Several security vulnerabilities have been fixed since the
+ Three security vulnerabilities have been fixed since the
previous release. See the
<ulink url="http://www.ethereal.com/appnotes/enpa-sa-00022.html">application
advisory</ulink> for more details.
@@ -89,6 +89,14 @@ Gnu info
Versions affected: 0.9.1 to 0.10.13.
</para></listitem>
+ <listitem><para>
+ iDefense found a buffer overflow in the OSPF dissector.
+ <!-- Fixed in r16507 -->
+ <!-- Bug IDs: None -->
+ <!-- CVE: CAN-2005-3651 -->
+ Versions affected: 0.8.20 to 0.10.13.
+ </para></listitem>
+
</itemizedlist>
</para>
</section>