Wireshark-users: [Wireshark-users] Wireshark 1.10.8 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Thu, 12 Jun 2014 15:26:59 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm proud to announce the release of Wireshark 1.10.8.

     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2014-07
       The frame metadissector could crash. ([2]Bug 9999, [3]Bug
       10030)
       Versions affected: 1.10.0 to 1.10.7
       [4]CVE-2014-4020

   The following bugs have been fixed:
     * VoIP flow graph crash upon opening. ([5]Bug 9179)
     * Tshark with "-F pcap" still generates a pcapng file.
       ([6]Bug 9991)
     * IPv6 Next Header 0x3d recognized as SHIM6. ([7]Bug 9995)
     * Failed to export pdml on large pcap. ([8]Bug 10081)
     * TCAP: set a fence on info column after calling sub
       dissector ([9]Bug 10091)
     * Dissector bug in JSON protocol. ([10]Bug 10115)
     * GSM RLC MAC: do not skip too many lines of the CSN_DESCR
       when the field is missing ([11]Bug 10120)
     * Wireshark PEEKREMOTE incorrectly decoding QoS data packets
       from Cisco Sniffer APs. ([12]Bug 10139)
     * IEEE 802.11: fix dissection of HT Capabilities ([13]Bug
       10166)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   CIP, EtherNet/IP, GSM RLC MAC, IEEE 802.11, IPv6, and TCAP

  New and Updated Capture File Support

   pcap-ng, and PEEKREMOTE
     __________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available
   from [14]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [15]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([16]Bug
   1419)

   The BER dissector might infinitely loop. ([17]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([18]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([19]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([20]Win64 development page)

   Resolving ([21]Bug 9044) reopens ([22]Bug 3528) so that
   Wireshark no longer automatically decodes gzip data when
   following a TCP stream.

   Application crash when changing real-time option. ([23]Bug
   4035)

   Hex pane display issue after startup. ([24]Bug 4056)

   Packet list rows are oversized. ([25]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([26]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([27]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [28]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [29]the web site.

   Official Wireshark training and certification are available
   from [30]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [31]Wireshark web site.
     __________________________________________________________

   Last updated 2014-06-12 12:30:53 PDT

References

   1. https://www.wireshark.org/security/wnpa-sec-2014-07.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9999
   3. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10030
   4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4020
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9179
   6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9991
   7. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9995
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10081
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10091
  10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10115
  11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10120
  12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10139
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10166
  14. http://www.wireshark.org/download.html
  15. http://www.wireshark.org/download.html#thirdparty
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  20. https://wiki.wireshark.org/Development/Win64
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  28. http://ask.wireshark.org/
  29. http://www.wireshark.org/lists/
  30. http://www.wiresharktraining.com/
  31. http://www.wireshark.org/faq.html


Digests

wireshark-1.10.8.tar.bz2: 26715025 bytes
MD5(wireshark-1.10.8.tar.bz2)=510dc3b063785549b41ebc748ac21055
SHA1(wireshark-1.10.8.tar.bz2)=aa6067ce91637506504c8b954caf75ac98742152
RIPEMD160(wireshark-1.10.8.tar.bz2)=5c2aab7477ab2f9b5f966fe5f973ff5619c242f9

Wireshark-win64-1.10.8.exe: 28013520 bytes
MD5(Wireshark-win64-1.10.8.exe)=e256e3e7ae0a68f7e75ab97d859c7db4
SHA1(Wireshark-win64-1.10.8.exe)=067af8281c656a4d12122e3d8a969dff792f73a0
RIPEMD160(Wireshark-win64-1.10.8.exe)=6712fa0cd38126f1c269bcdcb451619ac9ecf975

Wireshark-win32-1.10.8.exe: 22157280 bytes
MD5(Wireshark-win32-1.10.8.exe)=54ff02439cbea9a8634445b7347c579c
SHA1(Wireshark-win32-1.10.8.exe)=08af8ed728b106e9f04d5edd53027498f5bb243b
RIPEMD160(Wireshark-win32-1.10.8.exe)=d654fd7a2c58b5e25460a854ce2bff9316e1d90f

Wireshark-1.10.8.u3p: 30644928 bytes
MD5(Wireshark-1.10.8.u3p)=471e4257f37741c1e46fe6ad672510f4
SHA1(Wireshark-1.10.8.u3p)=52be28ba6e289d747be2c720dcf953887c02f850
RIPEMD160(Wireshark-1.10.8.u3p)=6ddb45bd3a08d21e90be5a2116a9c4739bb23a67

WiresharkPortable-1.10.8.paf.exe: 23526016 bytes
MD5(WiresharkPortable-1.10.8.paf.exe)=2921097f49b3e79b93ae0f26dfca461b
SHA1(WiresharkPortable-1.10.8.paf.exe)=a3477f7bdd8f71241b2c21db11c5581d60c38ea2
RIPEMD160(WiresharkPortable-1.10.8.paf.exe)=3c8994b67a75357669b23dddc4473d0474ddca8c

Wireshark 1.10.8 Intel 32.dmg: 20467272 bytes
MD5(Wireshark 1.10.8 Intel 32.dmg)=5da5d7874e6bef4e581a69b736800763
SHA1(Wireshark 1.10.8 Intel
32.dmg)=53d57f90834d3b3baf3d1382b9d8f2bd6941b121
RIPEMD160(Wireshark 1.10.8 Intel
32.dmg)=7d093cabfff7215ec17e317dfabbaf3ba67bf640

Wireshark 1.10.8 Intel 64.dmg: 24775434 bytes
MD5(Wireshark 1.10.8 Intel 64.dmg)=355c5ebabe825b90fa1abdf4713d9ddb
SHA1(Wireshark 1.10.8 Intel
64.dmg)=830b6535f6f3212f813054851a6baed535303f75
RIPEMD160(Wireshark 1.10.8 Intel
64.dmg)=3e521a3c1ea627bc4f058cd8ebd13444d986ab06

patch-wireshark-1.10.7-to-1.10.8.bz2: 110206 bytes
MD5(patch-wireshark-1.10.7-to-1.10.8.bz2)=aabcd9603bb91fb8c8e1275bab87a123
SHA1(patch-wireshark-1.10.7-to-1.10.8.bz2)=d56411665e1c781a25b84c9c25d6b9f6f1d66661
RIPEMD160(patch-wireshark-1.10.7-to-1.10.8.bz2)=82256d8668087b904cc24c8072da215279e7f03c
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (Darwin)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlOaKTMACgkQpw8IXSHylJo3OQCeNpDrleIfwN2soXQyD6pEtcv7
6aYAnjZfRnHuqJAlg4XnzORrDERrD3O3
=gvlq
-----END PGP SIGNATURE-----