We maintain each stable release for two years. More information
(including EOL dates) can be found at
http://wiki.wireshark.org/Development/LifeCycle
On 8/16/12 9:23 AM, Marco Zuppone wrote:
> Hello,
>
> first of all the even versions (1.4, 1.6, 1.8) are all
stable.
> Why the old stable branches are still maintained ?
> This is due to the fact (I think) the different versions have
different hardware/software requirements and so if you need to
work with an old software/hardware for some legacy reason you
still have access to these versions.
> Regards,
> Marco Zuppone
> On 16 Aug 2012, at 02:10, Jim LeJeune
<jlejeune426@xxxxxxxxx <mailto:jlejeune426@xxxxxxxxx>>
wrote:
>
>> Could you please tell me why you are "releasing"
Wireshark 1.4.15, 1.6.10,_AND_ 1.8.2 ??? !!!
>>
>> On Wed, Aug 15, 2012 at 3:20 PM, Wireshark announcements
<wireshark-announce@xxxxxxxxxxxxx
<mailto:wireshark-announce@xxxxxxxxxxxxx>> wrote:
>>
I'm proud to announce the release of
Wireshark 1.8.2.
What is Wireshark?
Wireshark is the world's most popular network protocol
analyzer.
It is used for troubleshooting, analysis, development and
education.
What's New
Bug Fixes
The following vulnerabilities have been fixed.
o wnpa-sec-2012-13
The DCP ETSI dissector could trigger a zero division.
Reported
by Laurent Butti. (Bug 7566)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4285
o wnpa-sec-2012-14
The MongoDB dissector could go into a large loop. Reported
by
Ben Schmidt. (Bug 7572)
Versions affected: 1.8.0 to 1.8.1.
CVE-2012-4287
o wnpa-sec-2012-15
The XTP dissector could go into an infinite loop. Reported
by
Ben Schmidt. (Bug 7571)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4288
o wnpa-sec-2012-16
The ERF dissector could overflow a buffer. Reported by
Laurent
Butti. (Bug 7563)
Versions affected: 1.8.0 to 1.8.1.
CVE-2012-4294 CVE-2012-4295
o wnpa-sec-2012-17
The AFP dissector could go into a large loop. Reported by
Stefan Cornelius. (Bug 7603)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4289
o wnpa-sec-2012-18
The RTPS2 dissector could overflow a buffer. Reported by
Laurent Butti. (Bug 7568)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4296
o wnpa-sec-2012-19
The GSM RLC MAC dissector could overflow a buffer. Reported
by
Laurent Butti. (Bug 7561)
Versions affected: 1.6.0 to 1.6.9, 1.8.0 to 1.8.1.
CVE-2012-4297
o wnpa-sec-2012-20
The CIP dissector could exhaust system memory. Reported by
Ben
Schmidt. (Bug 7570)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4291
o wnpa-sec-2012-21
The STUN dissector could crash. Reported by Laurent Butti.
(Bug 7569)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4292
o wnpa-sec-2012-22
The EtherCAT Mailbox dissector could abort. Reported by
Laurent Butti. (Bug 7562)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4293
o wnpa-sec-2012-23
The CTDB dissector could go into a large loop. Reported by
Ben
Schmidt. (Bug 7573)
Versions affected: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0
to
1.8.1.
CVE-2012-4290
o wnpa-sec-2012-24
The pcap-ng file parser could trigger a zero division. (Bug
7533)
Versions affected: 1.8.0 to 1.8.1.
CVE-2012-4286
o wnpa-sec-2012-25
The Ixia IxVeriWave file parser could overflow a buffer.
(Bug
7533)
Versions affected: 1.8.0 to 1.8.1.
CVE-2012-4298
The following bugs have been fixed:
o Move Y.1711 out of MPLS dissector. (Bug 6787)
o Patch: Add frame.interface_id support for ERF file format.
(Bug 7266)
o Freeze when Resizing or Moving while capturing. (Bug 7305)
o Wireshark crashes when using multiple files. (Bug 7423)
o Wireshark crashes on opening very short NFS pcap file. (Bug
7498)
o Analyze->Apply as Filter and Analyze->Prepare a
Filter cause
crashes. (Bug 7506)
o crashes in interface list, pipe handling. (Bug 7511)
o ISDN LAPD X.31 packet traffic can not be decoded. (Bug
7514)
o GIOP request_id used for sub dissectors is not assigned
when
decoding GIOP 1.2 Request message. (Bug 7516)
o pcap-ng -ISB always writes 0 for isb_ifrecv option. (Bug
7523)
o GSM classmark3 decode wrong. (Bug 7524)
o mem corruption\heap corruption\div0 bugs. (Bug 7533)
o DNS AD flag not shown properly. (Bug 7555)
o Wireshark and TShark crash at start with invalid color
filter
on SPARC. (Bug 7634)
New and Updated Features
There are no new features in this release.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
AFP, Apache JServ Protocol v1.3, Bluetooth L2CAP, CIP, CTDB,
DCP
ETSI, ERF, EtherCAT Mailbox, FC Link Control, GIOP, GSM A, GSM
RLC
MAC, GTP, GTPv2, ISDN, LISP, MongoDB, MPLS ITU-T Y.1711 OAM,
MPLS
PM, NFS, RTPS2, SCTP, STUN, XTP
New and Updated Capture File Support
Ixia IxVeriWave, pcap-ng
Getting Wireshark
Wireshark source code and installation packages are available
from
http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark
packages.
You can usually install or upgrade Wireshark using the package
management system specific to that platform. A list of
third-party
packages can be found on the download page on the Wireshark web
site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About→Folders to find the default locations on your system.
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. (Bug
1419)
The BER dissector might infinitely loop. (Bug 1516)
Capture filters aren't applied when capturing from named pipes.
(Bug 1814)
Filtering tshark captures with display filters (-R) no longer
works. (Bug 2234)
The 64-bit Windows installer does not support Kerberos
decryption.
(Win64 development page)
Application crash when changing real-time option. (Bug 4035)
Hex pane display issue after startup. (Bug 4056)
Packet list rows are oversized. (Bug 4357)
Summary pane selected frame highlighting not maintained. (Bug
4445)
Wireshark and TShark will display incorrect delta times in some
cases. (Bug 4985)
Getting Help
Community support is available on Wireshark's Q&A site and
on the
wireshark-users mailing list. Subscription information and
archives for all of Wireshark's mailing lists can be found on
the
web site.
Official Wireshark training and certification are available
from
Wireshark University.
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site.
Digests
wireshark-1.8.2.tar.bz2: 24121798 bytes
MD5(wireshark-1.8.2.tar.bz2)=5e3ea7eed50dace479e12f49d24506f4
SHA1(wireshark-1.8.2.tar.bz2)=4737d9745dbf002444ea42615243abf3bb80b943
RIPEMD160(wireshark-1.8.2.tar.bz2)=5fece857d5187b146a690fda111a0611e108c2a9
Wireshark-win32-1.8.2.exe: 20952624 bytes
MD5(Wireshark-win32-1.8.2.exe)=5b21cb547e53d762d56733293fcb1443
SHA1(Wireshark-win32-1.8.2.exe)=e619813a658f0ea522cf67259276a45d68c25698
RIPEMD160(Wireshark-win32-1.8.2.exe)=0a79f676847d260efda736602fdd6a74b7dceb97
Wireshark-win64-1.8.2.exe: 26624472 bytes
MD5(Wireshark-win64-1.8.2.exe)=5f604647f30b3c9e9604d0edaceaf21a
SHA1(Wireshark-win64-1.8.2.exe)=c12d8d3b954c26df0a2b34ae85810223734c344d
RIPEMD160(Wireshark-win64-1.8.2.exe)=6756d7cc9a68a548fab968f69bc3897b76c17084
Wireshark-1.8.2.u3p: 28364992 bytes
MD5(Wireshark-1.8.2.u3p)=1de4fa4364e92f6f986c9998bc8aa34f
SHA1(Wireshark-1.8.2.u3p)=a4d2d7a82e5ee581f0d5a8bf937bfe65d68bbb60
RIPEMD160(Wireshark-1.8.2.u3p)=4663cf7f1047b0b71f15f6a98f0aeee8d5100c78
WiresharkPortable-1.8.2.paf.exe: 21965928 bytes
MD5(WiresharkPortable-1.8.2.paf.exe)=6a1b8bc92db4ed47ea1e42bbf1134ec2
SHA1(WiresharkPortable-1.8.2.paf.exe)=36e46b955d757950f6088cff058c0d8353c77f23
RIPEMD160(WiresharkPortable-1.8.2.paf.exe)=ca6ff5364cefccc40175f91306a5b13389b20393
Wireshark 1.8.2 Intel 32.dmg: 22056362 bytes
MD5(Wireshark 1.8.2 Intel 32.dmg)=7891af48ebfdb5b722eae70d652c016d
SHA1(Wireshark 1.8.2 Intel
32.dmg)=c3743c5f74554ba52b212ffa1cb9a5843a8818ee
RIPEMD160(Wireshark 1.8.2 Intel
32.dmg)=951628019771b274291b30cf0a3e830664c8afb0
Wireshark 1.8.2 Intel 64.dmg: 21744672 bytes
MD5(Wireshark 1.8.2 Intel 64.dmg)=24a842d1d1be59f60cbe13c344031823
SHA1(Wireshark 1.8.2 Intel
64.dmg)=5044639e002857d339e0a1f0da3ac7066f521aa2
RIPEMD160(Wireshark 1.8.2 Intel
64.dmg)=ae25d382e5259a6805c96abc0bae1aef1a5a29c0
Wireshark 1.8.2 PPC 32.dmg: 22870644 bytes
MD5(Wireshark 1.8.2 PPC 32.dmg)=ce6058b1a9ee6a00841b2ef0ab19ab62
SHA1(Wireshark 1.8.2 PPC
32.dmg)=7eccc8237828df02d9ad351e290967d6b2015889
RIPEMD160(Wireshark 1.8.2 PPC
32.dmg)=27b60ad605dbf0e8728a60baddb385aace8585e9
patch-wireshark-1.8.1-to-1.8.2.diff.bz2: 73250 bytes
MD5(patch-wireshark-1.8.1-to-1.8.2.diff.bz2)=ea35b096d9e7944390a8c942d1138c90
SHA1(patch-wireshark-1.8.1-to-1.8.2.diff.bz2)=8cc87bb223a2273faaf200cc9f410373e02409c4
RIPEMD160(patch-wireshark-1.8.1-to-1.8.2.diff.bz2)=97dcef9418399ff8f97b7fa61c0b09020bfe0823
>>
___________________________________________________________________________
>> Sent via: Wireshark-announce mailing list
<wireshark-announce@xxxxxxxxxxxxx
<mailto:wireshark-announce@xxxxxxxxxxxxx>>
>> Archives:
http://www.wireshark.org/lists/wireshark-announce
>> Unsubscribe:
https://wireshark.org/mailman/options/wireshark-announce
>> mailto:wireshark-announce-request@xxxxxxxxxxxxx
<mailto:wireshark-announce-request@xxxxxxxxxxxxx>?subject=unsubscribe
>>
>>
>>
___________________________________________________________________________
>> Sent via: Wireshark-users mailing list
<wireshark-users@xxxxxxxxxxxxx
<mailto:wireshark-users@xxxxxxxxxxxxx>>
>> Archives: http://www.wireshark.org/lists/wireshark-users
>> Unsubscribe:
https://wireshark.org/mailman/options/wireshark-users
>>
mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe
>
>
>
>
___________________________________________________________________________
> Sent via: Wireshark-users mailing list
<wireshark-users@xxxxxxxxxxxxx>
> Archives: http://www.wireshark.org/lists/wireshark-users
> Unsubscribe:
https://wireshark.org/mailman/options/wireshark-users
>
mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe
|