Wireshark-users: Re: [Wireshark-users] [Wireshark-announce] Wireshark 1.10.6 is now available
From: Jim LeJeune <jlejeune426@xxxxxxxxx>
Date: Sat, 8 Mar 2014 01:59:59 -0600
why does 1.10.6 arrive at 1:49, and 1.8.13 at 2:13 ????????????????
On Fri, Mar 7, 2014 at 1:49 PM, Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm proud to announce the release of Wireshark 1.10.6.
__________________________________________________________
What is Wireshark?
Wireshark is the world's most popular network protocol
analyzer. It is used for troubleshooting, analysis, development
and education.
__________________________________________________________
What's New
Bug Fixes
The following vulnerabilities have been fixed.
* [1]wnpa-sec-2014-01
The NFS dissector could crash. Discovered by Moshe Kaplan.
([2]Bug 9672)
Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12
[3]CVE-2014-2281
* [4]wnpa-sec-2014-02
The M3UA dissector could crash. Discovered by Laurent
Butti. ([5]Bug 9699)
Versions affected: 1.10.0 to 1.10.5
[6]CVE-2014-2282
* [7]wnpa-sec-2014-03
The RLC dissector could crash. ([8]Bug 9730)
Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12
[9]CVE-2014-2283
* [10]wnpa-sec-2014-04
The MPEG file parser could overflow a buffer. Discovered by
Wesley Neelen. ([11]Bug 9843)
Versions affected: 1.10.0 to 1.10.5, 1.8.0 to 1.8.12
[12]CVE-2014-2299
The following bugs have been fixed:
* Customized OUI is not recognized correctly during
dissection. ([13]Bug 9122)
* Properly decode CAPWAP Data Keep-Alives. ([14]Bug 9165)
* Build failure with GTK 3.10 - GTK developers have gone
insane. ([15]Bug 9340)
* SIGSEGV/SIGABRT during free of TvbRange using a chained
dissector in lua. ([16]Bug 9483)
* MPLS dissector no longer registers itself in "ppp.protocol"
table. ([17]Bug 9492)
* Tshark doesn't display the longer data fields (mbtcp).
([18]Bug 9572)
* DMX-CHAN disector does not clear strbuf between rows.
([19]Bug 9598)
* Dissector bug, protocol SDP: proto.c:4214: failed assertion
"length >= 0". ([20]Bug 9633)
* False error: capture file appears to be damaged or corrupt.
([21]Bug 9634)
* SMPP field source_telematics_id field length different from
spec. ([22]Bug 9649)
* Lua: bitop library is missing in Lua 5.2. ([23]Bug 9720)
* GTPv1-C / MM Context / Authentication quintuplet / RAND is
not correct. ([24]Bug 9722)
* Lua: ProtoField.new() is buggy. ([25]Bug 9725)
* Lua: ProtoField.bool() VALUESTRING argument is not optional
but was supposed to be. ([26]Bug 9728)
* Problem with CAPWAP Wireshark Dissector. ([27]Bug 9752)
* nas-eps dissector: CS Service notification dissection stops
after Paging identity IE. ([28]Bug 9789)
New and Updated Features
IPv4 checksum verfification is now disabled by default.
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
AppleTalk, CAPWAP, DMX-CHAN, DSI, DVB-CI, ESS, GTPv1, IEEE
802a, M3UA, Modbus/TCP, NAS-EPS, NFS, OpenSafety, SDP, and SMPP
New and Updated Capture File Support
libpcap, MPEG, and pcap-ng
__________________________________________________________
Getting Wireshark
Wireshark source code and installation packages are available
from [29]http://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark
packages. You can usually install or upgrade Wireshark using
the package management system specific to that platform. A list
of third-party packages can be found on the [30]download page
on the Wireshark web site.
__________________________________________________________
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
These locations vary from platform to platform. You can use
About->Folders to find the default locations on your system.
__________________________________________________________
Known Problems
Dumpcap might not quit if Wireshark or TShark crashes. ([31]Bug
1419)
The BER dissector might infinitely loop. ([32]Bug 1516)
Capture filters aren't applied when capturing from named pipes.
([33]Bug 1814)
Filtering tshark captures with read filters (-R) no longer
works. ([34]Bug 2234)
The 64-bit Windows installer does not support Kerberos
decryption. ([35]Win64 development page)
Resolving ([36]Bug 9044) reopens ([37]Bug 3528) so that
Wireshark no longer automatically decodes gzip data when
following a TCP stream.
Application crash when changing real-time option. ([38]Bug
4035)
Hex pane display issue after startup. ([39]Bug 4056)
Packet list rows are oversized. ([40]Bug 4357)
Summary pane selected frame highlighting not maintained.
([41]Bug 4445)
Wireshark and TShark will display incorrect delta times in some
cases. ([42]Bug 4985)
__________________________________________________________
Getting Help
Community support is available on [43]Wireshark's Q&A site and
on the wireshark-users mailing list. Subscription information
and archives for all of Wireshark's mailing lists can be found
on [44]the web site.
Official Wireshark training and certification are available
from [45]Wireshark University.
__________________________________________________________
Frequently Asked Questions
A complete FAQ is available on the [46]Wireshark web site.
__________________________________________________________
Last updated 2014-03-06 13:50:43 PST
References
1. https://www.wireshark.org/security/wnpa-sec-2014-01.html
2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9672
3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281
4. https://www.wireshark.org/security/wnpa-sec-2014-02.html
5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9699
6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282
7. https://www.wireshark.org/security/wnpa-sec-2014-03.html
8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9730
9. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283
10. https://www.wireshark.org/security/wnpa-sec-2014-04.html
11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843
12. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299
13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9122
14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9165
15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9340
16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9483
17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9492
18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9572
19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9598
20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9633
21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9634
22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9649
23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9720
24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9722
25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9725
26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9728
27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9752
28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9789
29. http://www.wireshark.org/download.html
30. http://www.wireshark.org/download.html#thirdparty
31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
35. https://wiki.wireshark.org/Development/Win64
36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
43. http://ask.wireshark.org/
44. http://www.wireshark.org/lists/
45. http://www.wiresharktraining.com/
46. http://www.wireshark.org/faq.html
Digests
wireshark-1.10.6.tar.bz2: 26719003 bytes
MD5(wireshark-1.10.6.tar.bz2)=c67435039d67ef1757bfff0ab88824ab
SHA1(wireshark-1.10.6.tar.bz2)=081a2daf85e3257d7a2699e84a330712e3e5b9bb
RIPEMD160(wireshark-1.10.6.tar.bz2)=3018f4d60d1ac86dfffd875a53373c85f5be44e8
Wireshark-win64-1.10.6.exe: 27997568 bytes
MD5(Wireshark-win64-1.10.6.exe)=e8f43d082c9e231d2e26ab425c813024
SHA1(Wireshark-win64-1.10.6.exe)=b80d3ac8f5d5a8a117791e04f5dab535082a3b26
RIPEMD160(Wireshark-win64-1.10.6.exe)=965df3d1d1d53651c92119215e8d3313b824567b
Wireshark-win32-1.10.6.exe: 22144296 bytes
MD5(Wireshark-win32-1.10.6.exe)=dbd18f81ddfc2b9ce7d9dafbb867c839
SHA1(Wireshark-win32-1.10.6.exe)=677089c75cb133481d28e99c4a18d5fcc9cdde2d
RIPEMD160(Wireshark-win32-1.10.6.exe)=0a66f96cb9a38e5d95394939afdbf87e52ad550b
Wireshark-1.10.6.u3p: 30626145 bytes
MD5(Wireshark-1.10.6.u3p)=b2e091e1ed46892c786499aa99a4370d
SHA1(Wireshark-1.10.6.u3p)=b729564b9f2ba91b0506b8745c7ae6d251b163b0
RIPEMD160(Wireshark-1.10.6.u3p)=48a6d9f6cd95992cf8a0b5258a3b70f7115e8507
WiresharkPortable-1.10.6.paf.exe: 23510304 bytes
MD5(WiresharkPortable-1.10.6.paf.exe)=5521237175d8e6c49d657739d18ff7c6
SHA1(WiresharkPortable-1.10.6.paf.exe)=bcd9d4456e201ccbc1ff4099920d86a6c4fc6394
RIPEMD160(WiresharkPortable-1.10.6.paf.exe)=6ae8d157fb52f55122d357e9cf2d96c98a7f7656
Wireshark 1.10.6 Intel 32.dmg: 20440930 bytes
MD5(Wireshark 1.10.6 Intel 32.dmg)=676dba2204867b2eea02e4538369f805
SHA1(Wireshark 1.10.6 Intel
32.dmg)=883aa4f8a295d2d81a86ea1489e5ee5afea20345
RIPEMD160(Wireshark 1.10.6 Intel
32.dmg)=2a4656286f9c9069e25b05bcee53f1ab7143859d
Wireshark 1.10.6 Intel 64.dmg: 24759668 bytes
MD5(Wireshark 1.10.6 Intel 64.dmg)=2b7869244d5be26b1c041789fa734702
SHA1(Wireshark 1.10.6 Intel
64.dmg)=2e03a4ee893ccf1f6bd27a665ace99bdd9b78c98
RIPEMD160(Wireshark 1.10.6 Intel
64.dmg)=c70679036eb3cdc8edc3774e6ed0ef22ac4f65aa
patch-wireshark-1.10.5-to-1.10.6.bz2: 522044 bytes
MD5(patch-wireshark-1.10.5-to-1.10.6.bz2)=4ed579c3ddb27818f020c2a213d7cd08
SHA1(patch-wireshark-1.10.5-to-1.10.6.bz2)=b32555c43935c537b1602277f978b9c421acb83d
RIPEMD160(patch-wireshark-1.10.5-to-1.10.6.bz2)=f85b7f2eab0945ef808edbb483cb1f24ded5db24
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iEYEARECAAYFAlMaIrMACgkQpw8IXSHylJrYkwCgm8uSwjsTLMRQJ527PoZaosjZ
O8UAoNAWc811jlLU1hjcZJk33kDAVvNj
=NlQh
-----END PGP SIGNATURE-----
___________________________________________________________________________
Sent via: Wireshark-announce mailing list <wireshark-announce@xxxxxxxxxxxxx>
Archives: http://www.wireshark.org/lists/wireshark-announce
Unsubscribe: https://wireshark.org/mailman/options/wireshark-announce
mailto:wireshark-announce-request@xxxxxxxxxxxxx?subject=unsubscribe
- Follow-Ups:
- Re: [Wireshark-users] [Wireshark-announce] Wireshark 1.10.6 is now available
- From: Gerald Combs
- Re: [Wireshark-users] [Wireshark-announce] Wireshark 1.10.6 is now available
- Prev by Date: [Wireshark-users] Wireshark 1.8.13 is now available
- Next by Date: Re: [Wireshark-users] [Wireshark-announce] Wireshark 1.10.6 is now available
- Previous by thread: [Wireshark-users] Wireshark 1.8.13 is now available
- Next by thread: Re: [Wireshark-users] [Wireshark-announce] Wireshark 1.10.6 is now available
- Index(es):