Wireshark-users: [Wireshark-users] Wireshark 1.12.7 is now available

From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 12 Aug 2015 11:26:01 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.12.7.

     __________________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol analyzer. It is
   used for troubleshooting, analysis, development and education.
     __________________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2015-21
       Protocol tree crash. ([2]Bug 11309)
     * [3]wnpa-sec-2015-22
       Memory manager crash. ([4]Bug 11373)
     * [5]wnpa-sec-2015-23
       Dissector table crash. ([6]Bug 11381)
     * [7]wnpa-sec-2015-24
       ZigBee crash. ([8]Bug 11389)
     * [9]wnpa-sec-2015-25
       GSM RLC/MAC infinite loop. ([10]Bug 11358)
     * [11]wnpa-sec-2015-26
       WaveAgent crash. ([12]Bug 11358)
     * [13]wnpa-sec-2015-27
       OpenFlow infinite loop. ([14]Bug 11358)
     * [15]wnpa-sec-2015-28
       Ptvcursor crash. ([16]Bug 11358)
     * [17]wnpa-sec-2015-29
       WCCP crash. ([18]Bug 11358)

   The following bugs have been fixed:
     * DCE RPC "Decode As" capability is missing. ([19]Bug 10368)
     * Mergecap turns nanosecond-resolution time stamps into
       microsecond-resolution time stamps. ([20]Bug 11202)
     * The Aruba ERM Type 1 Dissector inconsistent with Type 0 and Type 3.
       ([21]Bug 11204)
     * Parse CFM Type Test signal (TST) without CRC. ([22]Bug 11286)
     * Tshark: output format of rpc.xid changed from Hex to Integer.
       ([23]Bug 11292)
     * Not stop -a filecount <COUNT>. ([24]Bug 11305)
     * lldp.ieee.802_3.mdi_power_class display is wrong. ([25]Bug 11330)
     * Powerlink (EPL) SDO packages interpreted as frame duplication.
       ([26]Bug 11341)
     * Mysql dissector adds packet content to INFO column without
       scrubbing it. ([27]Bug 11344)
     * PIM null-register according to rfc4601 is incorrectly parsed.
       ([28]Bug 11354)
     * Wireshark Lua dissectors: both expand together. ([29]Bug 11356)
     * Link-type not retrieved for rpcap interfaces configured with
       authentication. ([30]Bug 11366)
     * SSL Decryption (RSA private key with p smaller than q) failing on
       the Windows 7 buildbot. ([31]Bug 11372)
     * [gtpv2]PCSCF ip in the Protocol configuration of update bearer
       request is not getting populated. ([32]Bug 11378)
     * wpan.src64 (and dst64) filter always gives "is not a valid EUI64
       Address" error. ([33]Bug 11380)
     * Websphere MQ Work Information Header incorrectly showing
       "Reserved". ([34]Bug 11384)
     * DUP ACK Counter resetting after Window Update. ([35]Bug 11397)
     * CSV values missing when using tshark -2 option. ([36]Bug 11401)
     * Ethernet PAUSE frames are decoded incorrectly as PFC. ([37]Bug
       11403)
     * SOCKS decoder giving strange values for seemingly normal SOCKS
       connection. ([38]Bug 11417)
     * 802.11ad decoding error. ([39]Bug 11419)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   Aruba ERM, CFM, EPL, GSM A-bis OML, GSM MAP, GSM RLC/MAC, GTPv2, IEEE
   802.11, LLDP, LTE RRC, MAC Control, MQ, MySQL, OpcUa, OpenFlow,
   Radiotap, SCCP, SOCKS, TCP, WaveAgent, WCCP, and ZigBee

  New and Updated Capture File Support

   There is no new or updated capture file support in this release.
     __________________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available from
   [40]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can be
   found on the [41]download page on the Wireshark web site.
     __________________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for preference
   files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations
   vary from platform to platform. You can use About->Folders to find the
   default locations on your system.
     __________________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([42]Bug 1419)

   The BER dissector might infinitely loop. ([43]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([44]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer works.
   ([45]Bug 2234)

   The 64-bit Windows installer does not support Kerberos decryption.
   ([46]Win64 development page)

   Resolving ([47]Bug 9044) reopens ([48]Bug 3528) so that Wireshark no
   longer automatically decodes gzip data when following a TCP stream.

   Application crash when changing real-time option. ([49]Bug 4035)

   Hex pane display issue after startup. ([50]Bug 4056)

   Packet list rows are oversized. ([51]Bug 4357)

   Wireshark and TShark will display incorrect delta times in some cases.
   ([52]Bug 4985)
     __________________________________________________________________

Getting Help

   Community support is available on [53]Wireshark's Q&A site and on the
   wireshark-users mailing list. Subscription information and archives for
   all of Wireshark's mailing lists can be found on [54]the web site.

   Official Wireshark training and certification are available from
   [55]Wireshark University.
     __________________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [56]Wireshark web site.
     __________________________________________________________________

   Last updated 2015-08-12 09:39:37 PDT

References

   1. https://www.wireshark.org/security/wnpa-sec-2015-21.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11309
   3. https://www.wireshark.org/security/wnpa-sec-2015-22.html
   4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11373
   5. https://www.wireshark.org/security/wnpa-sec-2015-23.html
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11381
   7. https://www.wireshark.org/security/wnpa-sec-2015-24.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11389
   9. https://www.wireshark.org/security/wnpa-sec-2015-25.html
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
  11. https://www.wireshark.org/security/wnpa-sec-2015-26.html
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
  13. https://www.wireshark.org/security/wnpa-sec-2015-27.html
  14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
  15. https://www.wireshark.org/security/wnpa-sec-2015-28.html
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
  17. https://www.wireshark.org/security/wnpa-sec-2015-29.html
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10368
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11202
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11204
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11286
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11292
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11305
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11330
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11341
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11344
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11354
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11356
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11366
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11372
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11378
  33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11380
  34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11384
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11397
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11401
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11403
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11417
  39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11419
  40. http://www.wireshark.org/download.html
  41. http://www.wireshark.org/download.html#thirdparty
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  46. http://wiki.wireshark.org/Development/Win64
  47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  51. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  52. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  53. http://ask.wireshark.org/
  54. http://www.wireshark.org/lists/
  55. http://www.wiresharktraining.com/
  56. http://www.wireshark.org/faq.html


Digests

wireshark-1.12.7.tar.bz2: 29202490 bytes
MD5(wireshark-1.12.7.tar.bz2)=c8ae53f648b1dcbf6e74495401a0f1ab
SHA1(wireshark-1.12.7.tar.bz2)=bed365bacfd0b5c653d8568ad25e52957659bd9f
RIPEMD160(wireshark-1.12.7.tar.bz2)=4a36875d9203112045c41a9adf312b0a4f83bd49

Wireshark-win32-1.12.7.exe: 23613224 bytes
MD5(Wireshark-win32-1.12.7.exe)=cf407c3dcea767f67eb6bea7440e53c2
SHA1(Wireshark-win32-1.12.7.exe)=647ec4aceeee6b62697680c62e0cf105858287e2
RIPEMD160(Wireshark-win32-1.12.7.exe)=aeb49bdbaf9ea562fd3d5bd8b46904f4c43522c3

Wireshark-win64-1.12.7.exe: 29857792 bytes
MD5(Wireshark-win64-1.12.7.exe)=582a908bf6113c34a31c83d05477b3b2
SHA1(Wireshark-win64-1.12.7.exe)=2f57b9de65b655f3c724025c87a9f7a4578fc5c7
RIPEMD160(Wireshark-win64-1.12.7.exe)=7515b69a33ea2a559ea5632958deed9e7394d26a

WiresharkPortable-1.12.7.paf.exe: 29908896 bytes
MD5(WiresharkPortable-1.12.7.paf.exe)=b9bc91c5cea564c3407c4c5e431f051b
SHA1(WiresharkPortable-1.12.7.paf.exe)=8b097521fafe40fe1da7085a277c02a853a321fb
RIPEMD160(WiresharkPortable-1.12.7.paf.exe)=a44d9fcfff4383e43e360688ad1c246724d01d2e

Wireshark 1.12.7 Intel 64.dmg: 26429968 bytes
MD5(Wireshark 1.12.7 Intel 64.dmg)=e2d1da242114268be08ab9c78e578190
SHA1(Wireshark 1.12.7 Intel 64.dmg)=1e8efad7abce2dabf7c20d90594f69f0fa1ecb06
RIPEMD160(Wireshark 1.12.7 Intel
64.dmg)=2766b27ae03cc4df13fca9012b7bb11871c6aa59

Wireshark 1.12.7 Intel 32.dmg: 21884206 bytes
MD5(Wireshark 1.12.7 Intel 32.dmg)=501f54ce4070c747af8bb7f8d55990ff
SHA1(Wireshark 1.12.7 Intel 32.dmg)=68909564863fd56ab97f436c46a1642929b09306
RIPEMD160(Wireshark 1.12.7 Intel
32.dmg)=bc0275529a6d81322167f21e6399f3c97d5c43a0

patch-wireshark-1.12.6-to-1.12.7.bz2: 160154 bytes
MD5(patch-wireshark-1.12.6-to-1.12.7.bz2)=f8a470dd5a37236d63725743fc9b8cdb
SHA1(patch-wireshark-1.12.6-to-1.12.7.bz2)=7f624c9fd935eb2bd02cd8cb31425e42f1506bea
RIPEMD160(patch-wireshark-1.12.6-to-1.12.7.bz2)=65209e4bb5288e828b6cee33340818fde29bf0f6
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iEUEARECAAYFAlXLj7kACgkQpw8IXSHylJpZcwCfcRcnQ1jrSyf69qZsiqp/czxu
6lwAmLdEPUOb1XY8PpA542kefeTEhHo=
=2e9v
-----END PGP SIGNATURE-----