Wireshark-users: [Wireshark-users] Wireshark 1.4.10 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 01 Nov 2011 12:44:36 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.4.10. What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. What's New Bug Fixes The following vulnerabilities have been fixed. o wnpa-sec-2011-18 Huzaifa Sidhpurwala of Red Hat Security Response Team discovered that the Infiniband dissector could dereference a NULL pointer. (Bug 6476) Versions affected: 1.4.0 to 1.4.9, 1.6.0 to 1.6.2. o wnpa-sec-2011-19 Huzaifa Sidhpurwala of Red Hat Security Response Team discovered a buffer overflow in the ERF file reader. (Bug 6479) Versions affected: 1.4.0 to 1.4.9, 1.6.0 to 1.6.2. The following bugs have been fixed: o Assertion failed when doing File->Quit->Save during live capture. (Bug 1710) o Wrong PCEP XRO sub-object decoding. (Bug 3778) o Decoding [Status Records] Timestamp Sequence Field in Bundle Protocol fails if over 32 bits. (Bug 4109) o wireshark-1.4.2 crashes when testing the example python dissector because of a dissector count assertion. (Bug 5431) o Wireshark crashes when attempting to open a file via drag & drop when there's already a file open. (Bug 5987) o Add the ability to save filters from the Filter Toolbar into buttons on the Filter Toolbar. (Bug 6207) o Adding and removing custom HTTP headers requires a restart. (Bug 6241) o Can't read full 64-bit SNMP values. (Bug 6295) o BACnet property time-synchronization-interval (204) name shown incorrectly as time-synchronization-recipients. (Bug 6336) o [ASN.1 PER] Incorrect decoding of BIT STRING type. (Bug 6347) o Export -> Object -> HTTP -> save all: Error on saving files. (Bug 6362) o Incorrect identification of UDP-encapsulated NAT-keepalive packets. (Bug 6414) o S1AP protocol can't decode IPv6 transportLayerAddress. (Bug 6435) o RTPS2 dissector doesn't handle 0 in the octestToNextHeader field. (Bug 6449) o packet-ajp13 fix, cleanup, and enhancement. (Bug 6452) o Network Instruments Observer file format bugs. (Bug 6453) o Wireshark crashes when using "Open Recent" 2 times in a row. (Bug 6457) o Wireshark packet_gsm-sms, display bug: Filler bits in TP-User Data Header. (Bug 6469) o wireshark unable to decode NetFlow options which have system scope size != 4 bytes. (Bug 6471) o Display filter Expression Dialog Box Error. (Bug 6472) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support AJP13, ASN.1 PER, BACapp, DTN, GSM SMS, Infiniband, IPsec, NetFlow, PCEP, RTPS2, New and Updated Capture File Support . Getting Wireshark Wireshark source code and installation packages are available from http://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the download page on the Wireshark web site. File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. Known Problems Wireshark might make your system disassociate from a wireless network on OS X 10.4. (Bug 1315) Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) The BER dissector might infinitely loop. (Bug 1516) Capture filters aren't applied when capturing from named pipes. (Bug 1814) Filtering tshark captures with display filters (-R) no longer works. (Bug 2234) The 64-bit Windows installer does not ship with the same libraries as the 32-bit installer. (Bug 3610) Hex pane display issue after startup. (Bug 4056) Packet list rows are oversized. (Bug 4357) Summary pane selected frame highlighting not maintained. (Bug 4445) Getting Help Community support is available on Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on the web site. Training is available from Wireshark University. Frequently Asked Questions A complete FAQ is available on the Wireshark web site. Digests wireshark-1.4.10.tar.bz2: 20611930 bytes MD5(wireshark-1.4.10.tar.bz2) = d688 827a 9b99 083f d995 2c4f c0f3 410c SHA1(wireshark-1.4.10.tar.bz2) = ae7c 560c bb8f 87d4 64ec f56b a4d7 2f1c d542 f3a6 RIPEMD160(wireshark-1.4.10.tar.bz2) = c84f 56ca b1ca 5e08 bf02 30c0 6aad 726c d49e df9d wireshark-win32-1.4.10.exe: 19794589 bytes MD5(wireshark-win32-1.4.10.exe) = 0fae c58c 84c4 7b79 2897 044e c2fc 1e07 SHA1(wireshark-win32-1.4.10.exe) = 34df 8056 527d 49f4 7d57 8f03 3caf aca4 12f3 d628 RIPEMD160(wireshark-win32-1.4.10.exe) = 18c7 cbf4 98f4 81c6 ee0f 5920 4577 3335 f9d2 4cdf wireshark-win64-1.4.10.exe: 21858019 bytes MD5(wireshark-win64-1.4.10.exe) = 4092 afa3 9c8e 1ed1 749e d072 f6d8 dbac SHA1(wireshark-win64-1.4.10.exe) = c476 89f1 c98b 9e8e 16cb 9e10 bba7 b681 5646 85d5 RIPEMD160(wireshark-win64-1.4.10.exe) = 9dae 9a29 e213 6678 51b1 7e19 9820 d34d e8cf 8264 wireshark-1.4.10.u3p: 26296136 bytes MD5(wireshark-1.4.10.u3p) = 27d0 03e8 7b2b 33c8 36c1 c822 cde7 824d SHA1(wireshark-1.4.10.u3p) = e609 b0ba 0c1e e3ac 1f04 a0d9 ff8e 04f2 ae8a 5b83 RIPEMD160(wireshark-1.4.10.u3p) = f831 cf8a b356 44f4 745f 1ba1 a05c b4e4 2a03 9e5f WiresharkPortable-1.4.10.paf.exe: 20606108 bytes MD5(WiresharkPortable-1.4.10.paf.exe) = 9062 2b1c ff19 04b4 06e7 a1bd e5d2 2fb9 SHA1(WiresharkPortable-1.4.10.paf.exe) = 0417 f786 d9ff 1002 9efc 35ff 5f2e 5486 a1fc 1826 RIPEMD160(WiresharkPortable-1.4.10.paf.exe) = dba0 b226 481f c479 872b 6ed5 a0ca 2d57 a7b2 628e Wireshark 1.4.10 Intel 32.dmg: 47808846 bytes MD5(Wireshark 1.4.10 Intel 32.dmg) = 4dce 42ec d865 aa76 da6e f3b4 b51c 148f SHA1(Wireshark 1.4.10 Intel 32.dmg) = 00b9 506e c11f 27eb 437b ab01 7097 b3b8 438b 82ce RIPEMD160(Wireshark 1.4.10 Intel 32.dmg) = 4953 47e0 6d09 c028 f360 d9bb 43c8 9915 158b f31f Wireshark 1.4.10 Intel 64.dmg: 45529934 bytes MD5(Wireshark 1.4.10 Intel 64.dmg) = b9e9 bd29 4126 bc9a 2194 db95 b30e c9d7 SHA1(Wireshark 1.4.10 Intel 64.dmg) = 6e46 567f 0cd6 2741 a161 ba0c f816 c23a 91c7 2a85 RIPEMD160(Wireshark 1.4.10 Intel 64.dmg) = 10e7 1908 9270 72b5 98ad 6234 4d3f 9175 27cc 2b7f Wireshark 1.4.10 PPC 32.dmg: 50352432 bytes MD5(Wireshark 1.4.10 PPC 32.dmg) = 46a4 31cf 6a93 a5fd 2839 c659 57fe 5c97 SHA1(Wireshark 1.4.10 PPC 32.dmg) = dd6a 3552 ebe3 9511 e9b2 40a7 bb5d 2302 d38a f422 RIPEMD160(Wireshark 1.4.10 PPC 32.dmg) = 0e21 8bef 7147 e7d6 40d0 b52e 3416 ffef 92cd f107 patch-wireshark-1.4.9-to-1.4.10.diff.bz2: 865147 bytes MD5(patch-wireshark-1.4.9-to-1.4.10.diff.bz2) = f98a 0b02 a85a d42a 1a59 b409 243a fe48 SHA1(patch-wireshark-1.4.9-to-1.4.10.diff.bz2) = c07c d875 4eda 13e7 5ff6 5fc6 4519 f7b6 935a 8dc4 RIPEMD160(patch-wireshark-1.4.9-to-1.4.10.diff.bz2) = c9b1 d24f 1ae1 6f19 dec1 6da9 594d af40 116b c393 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk6wTCQACgkQpw8IXSHylJq1zQCfaQxU15uufFQUS2U+dl4yOPuh 3McAoJ5BVG1/2wr5OlZQzmX8O5iQStky =uShV -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-users] Wireshark 1.6.3 is now available
- Next by Date: [Wireshark-users] Display dumpcap in real time
- Previous by thread: [Wireshark-users] Wireshark 1.6.3 is now available
- Next by thread: [Wireshark-users] please help to look at my reject file produced by installing wireshark under FreeBSD ports!
- Index(es):