Wireshark-announce: [Wireshark-announce] Wireshark 1.12.10 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Fri, 26 Feb 2016 14:08:08 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm proud to announce the release of Wireshark 1.12.10. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2016-01 DLL hijacking vulnerability. [2]CVE-2016-2521 * [3]wnpa-sec-2016-03 DNP dissector infinite loop. ([4]Bug 11938) [5]CVE-2016-2523 * [6]wnpa-sec-2016-10 RSL dissector crash. ([7]Bug 11829) [8]CVE-2016-2530 [9]CVE-2016-2531 * [10]wnpa-sec-2016-11 LLRP dissector crash. ([11]Bug 12048) [12]CVE-2016-2532 * [13]wnpa-sec-2016-14 GSM A-bis OML dissector crash. ([14]Bug 11825) * [15]wnpa-sec-2016-15 ASN.1 BER dissector crash. ([16]Bug 12106) * [17]wnpa-sec-2016-18 ASN.1 BER dissector crash. ([18]Bug 11822) The following bugs have been fixed: * Questionable calling of ethernet dissector by encapsulating protocol dissectors. ([19]Bug 9933) * Improper RPC reassembly ([20]Bug 11913) * GTPv1 Dual Stack with one static and one Dynamic IP. ([21]Bug 11945) * Failed to parse M3AP IE (TNL information). ([22]Bug 12070) * Wrong interpretation of Instance ID value in OSPFv3 packet. ([23]Bug 12072) * MP2T Dissector does parse RTP properly in 2.0.1. ([24]Bug 12099) * editcap does not adjust time for frames with absolute timestamp 0 < t < 1 secs. ([25]Bug 12116) Windows installers and PortableApps® packages are now dual signed using SHA-1 and SHA-256 in order to comply with [26]Microsoft Authenticode policy. Windows 7 and Windows Server 2008 R2 users should ensure that [27]update 3123479 is installed. Windows Vista and Windows Server 2008 users should ensure that [28]hotfix 2763674 is installed. New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support ASN.1 BER, BATADV, DNP3, E100, EIGRP, GSM A DTAP, GSM SMS, GTP, HiQnet, InfiniBand, LLRP, M3AP, MP2T, NFS, OSPF, RoHC, RPC, RSL, TRILL, VXLAN, and X.509AF New and Updated Capture File Support __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [29]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [30]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([31]Bug 1419) The BER dissector might infinitely loop. ([32]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([33]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([34]Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. ([35]Win64 development page) Resolving ([36]Bug 9044) reopens ([37]Bug 3528) so that Wireshark no longer automatically decodes gzip data when following a TCP stream. Application crash when changing real-time option. ([38]Bug 4035) Hex pane display issue after startup. ([39]Bug 4056) Packet list rows are oversized. ([40]Bug 4357) Wireshark and TShark will display incorrect delta times in some cases. ([41]Bug 4985) __________________________________________________________________ Getting Help Community support is available on [42]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [43]the web site. Official Wireshark training and certification are available from [44]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [45]Wireshark web site. __________________________________________________________________ Last updated 2016-02-26 14:03:20 PST References 1. https://www.wireshark.org/security/wnpa-sec-2016-01.html 2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2521 3. https://www.wireshark.org/security/wnpa-sec-2016-03.html 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938 5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523 6. https://www.wireshark.org/security/wnpa-sec-2016-10.html 7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829 8. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530 9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531 10. https://www.wireshark.org/security/wnpa-sec-2016-11.html 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048 12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532 13. https://www.wireshark.org/security/wnpa-sec-2016-14.html 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825 15. https://www.wireshark.org/security/wnpa-sec-2016-15.html 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106 17. https://www.wireshark.org/security/wnpa-sec-2016-18.html 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9933 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11913 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11945 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12070 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12072 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12099 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12116 26. http://social.technet.microsoft.com/wiki/contents/articles/32288.windows-enforcement-of-authenticode-code-signing-and-timestamping.aspx 27. https://support.microsoft.com/en-us/kb/3123479 28. https://support.microsoft.com/en-us/kb/2763674 29. https://www.wireshark.org/download.html 30. https://www.wireshark.org/download.html#thirdparty 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 35. https://wiki.wireshark.org/Development/Win64 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 42. https://ask.wireshark.org/ 43. https://www.wireshark.org/lists/ 44. http://www.wiresharktraining.com/ 45. https://www.wireshark.org/faq.html Digests wireshark-1.12.10.tar.bz2: 29280006 bytes SHA256(wireshark-1.12.10.tar.bz2)=82be53dc80da3ee25e0f30dd91f1f802f66da62a4356049efd305e3e0672148b RIPEMD160(wireshark-1.12.10.tar.bz2)=ab31c3577878fd2a062e7e8706082c00c5069563 SHA1(wireshark-1.12.10.tar.bz2)=070ed41b1f02f72ff209b3eae135e60d09d69c69 MD5(wireshark-1.12.10.tar.bz2)=75f1309d85a015524e28f95011396a4a Wireshark-win64-1.12.10.exe: 29974296 bytes SHA256(Wireshark-win64-1.12.10.exe)=8bd4931f6319d2b942a6998dd38143cecf43a17aa0174ee17f46bf70cb88081a RIPEMD160(Wireshark-win64-1.12.10.exe)=562270f28ed6dcc4265d4498847b239347b13a60 SHA1(Wireshark-win64-1.12.10.exe)=ad3d9c52d125c805cbe953fb8dea434e101efcd9 MD5(Wireshark-win64-1.12.10.exe)=cf51dd75ca690a2da1379b9c67a0a75b Wireshark-win32-1.12.10.exe: 23748376 bytes SHA256(Wireshark-win32-1.12.10.exe)=0e9fdcc8d17098bc7ad01bb4f13a99a6a6722e3eea43a9c7034bbc20bdf0b1fe RIPEMD160(Wireshark-win32-1.12.10.exe)=524e647b41c4ab91b664b29764f1023a92322e49 SHA1(Wireshark-win32-1.12.10.exe)=50efd2f49b3fd92e01232fe9df9941c94aca913b MD5(Wireshark-win32-1.12.10.exe)=034897f8d4a53df0945fc4097506e114 WiresharkPortable-1.12.10.paf.exe: 30043584 bytes SHA256(WiresharkPortable-1.12.10.paf.exe)=664a6c26e10fa11a385b07b4cc04db944af98b0a80e5e946067085433ee5de63 RIPEMD160(WiresharkPortable-1.12.10.paf.exe)=40ae7829032cc7314b1fbdabe571ab0b0fd6a196 SHA1(WiresharkPortable-1.12.10.paf.exe)=601ec142c582dfd1a658fe9598882ae358990ef1 MD5(WiresharkPortable-1.12.10.paf.exe)=78d4d6e838cff30ed8959cc1df59bd77 Wireshark 1.12.10 Intel 64.dmg: 26476033 bytes SHA256(Wireshark 1.12.10 Intel 64.dmg)=fa88a5cf46e110b468ad0904509b846099912461763404f455e508c8c9210e90 RIPEMD160(Wireshark 1.12.10 Intel 64.dmg)=016431cca0cc50ccf791138ab4478fd312c674b2 SHA1(Wireshark 1.12.10 Intel 64.dmg)=111b3cf9d84ab4b463bd432a348d4a0638786ebb MD5(Wireshark 1.12.10 Intel 64.dmg)=c0e430a02395b2855f8eaf9ef6099228 Wireshark 1.12.10 Intel 32.dmg: 21928870 bytes SHA256(Wireshark 1.12.10 Intel 32.dmg)=3ebc8d75b726925db34f316014e5ec36e0b520cae8fcbaba90bd9e6649b0b1e8 RIPEMD160(Wireshark 1.12.10 Intel 32.dmg)=2f32aa7dc08b6b8696626f1388b5dd1643c7141c SHA1(Wireshark 1.12.10 Intel 32.dmg)=13fd189049f95ab86f7cbf926a1c3d3c649564fa MD5(Wireshark 1.12.10 Intel 32.dmg)=7ed8f2ca748aa9faebc6ecf604108407 patch-wireshark-1.12.9-to-1.12.10.bz2: 117642 bytes SHA256(patch-wireshark-1.12.9-to-1.12.10.bz2)=d35368fc8dc4eaa3feac52b0120725c2a4d04a6e7138f3fa95f57431aba19759 RIPEMD160(patch-wireshark-1.12.9-to-1.12.10.bz2)=67baf0172e27055cf4d029114f4d9235a4c959a8 SHA1(patch-wireshark-1.12.9-to-1.12.10.bz2)=ad68445df7ee019231e1e49fb362ed6229e15785 MD5(patch-wireshark-1.12.9-to-1.12.10.bz2)=e97f38dd621b653c6a1138a0889aec45 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlbQzMgACgkQpw8IXSHylJpVOgCgpBSi1hHaGDDYYo2ObNdQJENL gAUAoK/Z982y6iLPV6y9w74xzPuLLRfr =H9P+ -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-announce] Wireshark 2.0.2 is now available
- Previous by thread: [Wireshark-announce] Wireshark 2.0.2 is now available
- Index(es):