Sophie

Sophie

distrib > Mageia > 4 > x86_64 > by-pkgid > a2141f746eb1cb3219be38079b9daddd > files > 5

lib64wireshark3-1.10.12-1.mga4.x86_64.rpm

                    Wireshark 1.10.11 Release Notes
     __________________________________________________________

What is Wireshark?

   Wireshark is the world's most popular network protocol
   analyzer. It is used for troubleshooting, analysis, development
   and education.
     __________________________________________________________

What's New

  Bug Fixes

   The following vulnerabilities have been fixed.
     * [1]wnpa-sec-2014-20
       SigComp UDVM buffer overflow. ([2]Bug 10662)
       [3]CVE-2014-8710
     * [4]wnpa-sec-2014-21
       AMQP crash. ([5]Bug 10582) [6]CVE-2014-8711
     * [7]wnpa-sec-2014-22
       NCP crashes. ([8]Bug 10552, [9]Bug 10628) [10]CVE-2014-8712
       [11]CVE-2014-8713
     * [12]wnpa-sec-2014-23
       TN5250 infinite loops. ([13]Bug 10596) [14]CVE-2014-8714

   The following bugs have been fixed:
     * 6LoWPAN Mesh headers not treated as encapsulating address.
       ([15]Bug 10462)
     * UCP dissector bug of operation 31 - PID 0639 not
       recognized. ([16]Bug 10463)
     * iSCSI dissector rejects PDUs with "expected data transfer
       length" > 16M. ([17]Bug 10469)
     * GTPv2: trigging_tree under Trace information has wrong
       length. ([18]Bug 10470)
     * Attempt to render an SMS-DELIVER-REPORT instead of an
       SMS-DELIVER. ([19]Bug 10547)
     * IPv6 Mobility Option IPv6 Address/Prefix marks too many
       bytes for the address/prefix field. ([20]Bug 10576)
     * IPv6 Mobility Option Binding Authorization Data for FMIPv6
       Authenticator field is read beyond the option data.
       ([21]Bug 10577)
     * IPv6 Mobility Option Mobile Node Link Layer Identifier
       Link-layer Identifier field is read beyond the option data.
       ([22]Bug 10578)
     * Malformed PTPoE announce packet. ([23]Bug 10611)
     * IPv6 Permanent Home Keygen Token mobility option includes
       too many bytes for the token field. ([24]Bug 10619)
     * IPv6 Redirect Mobility Option K and N bits are parsed
       incorrectly. ([25]Bug 10622)
     * IPv6 Care Of Test mobility option includes too many bytes
       for the Keygen Token field. ([26]Bug 10624)
     * IPv6 MESG-ID mobility option is parsed incorrectly.
       ([27]Bug 10625)
     * IPv6 AUTH mobility option parses Mobility SPI and
       Authentication Data incorrectly. ([28]Bug 10626)
     * IPv6 DNS-UPDATE-TYPE mobility option includes too many
       bytes for the MD identity field. ([29]Bug 10629)
     * IPv6 Local Mobility Anchor Address mobility option's code
       and reserved fields are parsed as 2 bytes instead of 1.
       ([30]Bug 10630)
     * TShark crashes when running with PDML on a specific packet.
       ([31]Bug 10651)
     * IPv6 Mobility Option Context Request reads an extra
       request. ([32]Bug 10676)

  New and Updated Features

   There are no new features in this release.

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   6LoWPAN, AMQP, GSM MAP, GTPv2, H.223, IEEE 802.11, iSCSI, MIH,
   Mobile IPv6, PTPoE, TN5250, and UCP

  New and Updated Capture File Support

   Catapult DCT2000, HP-UX nettl, pcap-ng, and Sniffer (DOS)
     __________________________________________________________

Getting Wireshark

   Wireshark source code and installation packages are available
   from [33]http://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark
   packages. You can usually install or upgrade Wireshark using
   the package management system specific to that platform. A list
   of third-party packages can be found on the [34]download page
   on the Wireshark web site.
     __________________________________________________________

File Locations

   Wireshark and TShark look in several different locations for
   preference files, plugins, SNMP MIBS, and RADIUS dictionaries.
   These locations vary from platform to platform. You can use
   About->Folders to find the default locations on your system.
     __________________________________________________________

Known Problems

   Dumpcap might not quit if Wireshark or TShark crashes. ([35]Bug
   1419)

   The BER dissector might infinitely loop. ([36]Bug 1516)

   Capture filters aren't applied when capturing from named pipes.
   ([37]Bug 1814)

   Filtering tshark captures with read filters (-R) no longer
   works. ([38]Bug 2234)

   The 64-bit Windows installer does not support Kerberos
   decryption. ([39]Win64 development page)

   Resolving ([40]Bug 9044) reopens ([41]Bug 3528) so that
   Wireshark no longer automatically decodes gzip data when
   following a TCP stream.

   Application crash when changing real-time option. ([42]Bug
   4035)

   Hex pane display issue after startup. ([43]Bug 4056)

   Packet list rows are oversized. ([44]Bug 4357)

   Summary pane selected frame highlighting not maintained.
   ([45]Bug 4445)

   Wireshark and TShark will display incorrect delta times in some
   cases. ([46]Bug 4985)
     __________________________________________________________

Getting Help

   Community support is available on [47]Wireshark's Q&A site and
   on the wireshark-users mailing list. Subscription information
   and archives for all of Wireshark's mailing lists can be found
   on [48]the web site.

   Official Wireshark training and certification are available
   from [49]Wireshark University.
     __________________________________________________________

Frequently Asked Questions

   A complete FAQ is available on the [50]Wireshark web site.
     __________________________________________________________

   Last updated 2014-11-12 10:09:05 PST

References

   1. https://www.wireshark.org/security/wnpa-sec-2014-20.html
   2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10662
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710
   4. https://www.wireshark.org/security/wnpa-sec-2014-21.html
   5. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10582
   6. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711
   7. https://www.wireshark.org/security/wnpa-sec-2014-22.html
   8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10552
   9. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10628
  10. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712
  11. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713
  12. https://www.wireshark.org/security/wnpa-sec-2014-23.html
  13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10596
  14. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714
  15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10462
  16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10463
  17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10469
  18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10470
  19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10547
  20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10576
  21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10577
  22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10578
  23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10611
  24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10619
  25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10622
  26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10624
  27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10625
  28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10626
  29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10629
  30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10630
  31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10651
  32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10676
  33. http://www.wireshark.org/download.html
  34. http://www.wireshark.org/download.html#thirdparty
  35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419
  36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516
  37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814
  38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234
  39. https://wiki.wireshark.org/Development/Win64
  40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9044
  41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3528
  42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035
  43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4056
  44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357
  45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4445
  46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985
  47. http://ask.wireshark.org/
  48. http://www.wireshark.org/lists/
  49. http://www.wiresharktraining.com/
  50. http://www.wireshark.org/faq.html