Wireshark-users: [Wireshark-users] Wireshark 1.12.13 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 27 Jul 2016 13:17:26 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I'm proud to announce the release of Wireshark 1.12.13. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New This is the final release of Wireshark 1.12. It officially reaches end of life on July 31, 2016. If you are still using Wireshark 1.12 you are encouraged to upgrade to Wireshark 2.0. Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2016-40 NDS dissector crash. ([2]Bug 12576) * [3]wnpa-sec-2016-41 PacketBB crash. ([4]Bug 12577) * [5]wnpa-sec-2016-42 WSP infinite loop. ([6]Bug 12594) * [7]wnpa-sec-2016-43 MMSE infinite loop. ([8]Bug 12624) * [9]wnpa-sec-2016-44 RLC long loop. ([10]Bug 12660) * [11]wnpa-sec-2016-45 LDSS dissector crash. ([12]Bug 12662) * [13]wnpa-sec-2016-46 RLC dissector crash. ([14]Bug 12664) * [15]wnpa-sec-2016-47 OpenFlow long loop. ([16]Bug 12659) The following bugs have been fixed: * T30 FCF byte decoding masks DTC, CIG and NCS. ([17]Bug 1918) * TShark crashes with option "-z io,stat,..." in the presence of negative relative packet timestamps. ([18]Bug 9014) * Packet size limited during capture msg is repeated in the Info column. ([19]Bug 9826) * Filter for field name tcp.options.wscale.multiplier cannot exceed 255. ([20]Bug 12525) * Inconsistent VHT data rate. ([21]Bug 12558) New and Updated Features There are no new features in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support 802.11 Radiotap, LANforge, LDSS, MMSE, PacketBB, PRP, RLC, RTP MIDI, T.30, TCP, VITA 49, WiMax RNG-RSP, and WSP New and Updated Capture File Support and pcapng __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [22]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [23]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([24]Bug 1419) The BER dissector might infinitely loop. ([25]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([26]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([27]Bug 2234) The 64-bit Windows installer does not support Kerberos decryption. ([28]Win64 development page) Resolving ([29]Bug 9044) reopens ([30]Bug 3528) so that Wireshark no longer automatically decodes gzip data when following a TCP stream. Application crash when changing real-time option. ([31]Bug 4035) Hex pane display issue after startup. ([32]Bug 4056) Packet list rows are oversized. ([33]Bug 4357) Wireshark and TShark will display incorrect delta times in some cases. ([34]Bug 4985) __________________________________________________________________ Getting Help Community support is available on [35]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [36]the web site. Official Wireshark training and certification are available from [37]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [38]Wireshark web site. __________________________________________________________________ Last updated 2016-07-27 12:29:36 PDT References 1. https://www.wireshark.org/security/wnpa-sec-2016-40.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12576 3. https://www.wireshark.org/security/wnpa-sec-2016-41.html 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577 5. https://www.wireshark.org/security/wnpa-sec-2016-42.html 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594 7. https://www.wireshark.org/security/wnpa-sec-2016-43.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624 9. https://www.wireshark.org/security/wnpa-sec-2016-44.html 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660 11. https://www.wireshark.org/security/wnpa-sec-2016-45.html 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662 13. https://www.wireshark.org/security/wnpa-sec-2016-46.html 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664 15. https://www.wireshark.org/security/wnpa-sec-2016-47.html 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1918 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9014 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9826 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12525 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12558 22. https://www.wireshark.org/download.html 23. https://www.wireshark.org/download.html#thirdparty 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 28. https://wiki.wireshark.org/Development/Win64 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 35. https://ask.wireshark.org/ 36. https://www.wireshark.org/lists/ 37. http://www.wiresharktraining.com/ 38. https://www.wireshark.org/faq.html Digests wireshark-1.12.13.tar.bz2: 29398804 bytes SHA256(wireshark-1.12.13.tar.bz2)=7836cdaabd056ab4c9dd19cf0c791f11d980d0f6037542476034f2b7bdcf5d5b RIPEMD160(wireshark-1.12.13.tar.bz2)=45a46794ae375475597866145aa22984b31bedd6 SHA1(wireshark-1.12.13.tar.bz2)=4a036b67ca1ca99c9061cf3d12d0604a62bc8b8c MD5(wireshark-1.12.13.tar.bz2)=15af85adc8ba83e6e996e13a55df4fb0 Wireshark-win64-1.12.13.exe: 30000016 bytes SHA256(Wireshark-win64-1.12.13.exe)=31d5420cbf774961eb22f2b0d7cb74dd03a28fae92ded3386cb13fc6fd579053 RIPEMD160(Wireshark-win64-1.12.13.exe)=3b98d010ad2750654fd8bbae24d76ad7387c940d SHA1(Wireshark-win64-1.12.13.exe)=1d8eedea8a177016a644ee3fd8a0adaa326c6109 MD5(Wireshark-win64-1.12.13.exe)=39f05a5c5ebd3b183c74e986fb0e30ca Wireshark-win32-1.12.13.exe: 23765136 bytes SHA256(Wireshark-win32-1.12.13.exe)=47eb5c4ac48848fdfd5c322491e0320c998f5a2dccebad88af9ed787c1907039 RIPEMD160(Wireshark-win32-1.12.13.exe)=444c5898a58a2c6a90b3f62f146b4e17da945031 SHA1(Wireshark-win32-1.12.13.exe)=f65a13b356136c0a4f39ca94dd8c5393af465df7 MD5(Wireshark-win32-1.12.13.exe)=52853c0ebe373d4a04a5d15134e7e859 WiresharkPortable-1.12.13.paf.exe: 30073440 bytes SHA256(WiresharkPortable-1.12.13.paf.exe)=689a470fa5e1d922954eea0ba1bd235180c2b8d92b66c3a643e24b4a4cf7605a RIPEMD160(WiresharkPortable-1.12.13.paf.exe)=60ca4071f1445b9e0c4ae606d23bfe677c621f31 SHA1(WiresharkPortable-1.12.13.paf.exe)=9d0c3011e91e5b269a59592b2cb43899f03a8f4e MD5(WiresharkPortable-1.12.13.paf.exe)=4d973537801770f10d21cda1e64b8ecb Wireshark 1.12.13 Intel 32.dmg: 21958686 bytes SHA256(Wireshark 1.12.13 Intel 32.dmg)=a6e1772b10da9de19bbbb7d1ac3f486606cfad9cdaa58e091a6b0fafabcda411 RIPEMD160(Wireshark 1.12.13 Intel 32.dmg)=4f00e1ff7ee85d10fdb280157524fa6b158306bb SHA1(Wireshark 1.12.13 Intel 32.dmg)=95157d7a8eecfcf3e7155addd590863585db1039 MD5(Wireshark 1.12.13 Intel 32.dmg)=67b90605a9ac64c6b09e7c3fe9bf6747 Wireshark 1.12.13 Intel 64.dmg: 26539534 bytes SHA256(Wireshark 1.12.13 Intel 64.dmg)=a26b87ca9f5ac3b4c84250d460f379ddbe85647809d96eae297a9f7810c38dd3 RIPEMD160(Wireshark 1.12.13 Intel 64.dmg)=bf6402fc9a5336ec8b62ae38bddfbdcfd9b3556f SHA1(Wireshark 1.12.13 Intel 64.dmg)=d3f9a716e2344ccf6b921b00225b19dc54d9d224 MD5(Wireshark 1.12.13 Intel 64.dmg)=90e2d7c60c48de31caba57e66e427469 patch-wireshark-1.12.12-to-1.12.13.bz2: 93835 bytes SHA256(patch-wireshark-1.12.12-to-1.12.13.bz2)=a714c205a39b78994dff5dcbac58e1a0ab59877dbd7dee2c3fe5ab221a412d53 RIPEMD160(patch-wireshark-1.12.12-to-1.12.13.bz2)=39bd18cdcea8a8e3ab4c118a50ccf69119ce5f19 SHA1(patch-wireshark-1.12.12-to-1.12.13.bz2)=81b24071262451a716049223c9d876fdf2495f58 MD5(patch-wireshark-1.12.12-to-1.12.13.bz2)=6ee788e18e5746551b3b95c0ed07db32 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJXmRbWAAoJEIIkSnjm/q7qGrQP/2wGm0Su3iXpiBR22cQqElfw jeXpvX3h4LwX79PAgjrXEY3cTBRO7I8KDW2j4+m8jmdmW1H48b4KQjU/PkKgomXr zYCCW1VUzM2y4DHcmxZ1aKs/VRh4VyvvpRnQkF6yr9GJ1SdU/PfDFWeWMtqTG0U7 jCB737RT+IZdfjtJFBJuYMfpThgWAE88QEJOF5tTM3n0rBmAFNAIuqougNLOXSda Cjp3unSmA/b34Kbe6i6HD5Ip1RmwardPzg2dVG4jgEo/r4QUd7fJ0I4Fb13EpWWZ jQUw3Q7cz0TylprznWOkzmzSj5pEOXomiXm47scwPxVjRWDQM5a75Xs/uXMPjiZf Hhdu4C7bfs9shvnfW3BExb0rMbb1zvSbjfaZMycN9Cc8+QSJbEAUDd8FZyfY5STQ NfQP9UWRVn/vwmQhpsP1Wy70qzOL15C0x0i+SBuNE+d++RG8spuKXlKQkR9obF4U 5+VAvJ20kwWCBYOGFWmAGj+xtLnmwkGeWgINv9L1+vjZLlgbDMkjcu2qP05U3J+a W7X0nD9Xo0blXkQZJuUrwjrwcEBeIkmNU6NDVTIjJmnneeYAtdF5gf+OWhwUSUPY j+0Sn+sjIAtKsifGN8vabCSwdk+VWq1nza/qGu6i68oNrn17XldLvfWQuhgk2QjR PaXkygQamLc3XQVvgEsd =t1dd -----END PGP SIGNATURE-----
- Prev by Date: [Wireshark-users] Wireshark 2.0.5 is now available
- Previous by thread: [Wireshark-users] Wireshark 2.0.5 is now available
- Index(es):