67aa732e1f
- The following vulnerabilities have been fixed. See the security advisory for details and a workaround. - The GSM A RR dissector could crash. Versions affected: 1.2.0 to 1.2.1 - The OpcUa dissector could use excessive CPU and memory. Versions affected: 0.99.6 to 1.0.8, 1.2.0 to 1.2.1 - The TLS dissector could crash on some platforms. Versions affected: 1.2.0 to 1.2.1 - The following bugs have been fixed: - The "Capture->Interfaces" window can't be closed. (Bug 1740) - tshark-1.0.2 (dumpcap) signal abort core saved. (Bug 2767) - Memory leak fixes. (Bug 3330) - Display filter autocompletion doesn't work for some RADIUS and WiMAX ASNCP fields. (Bug 3538) - Wireshark Portable includes wrong WinPcap installer. (Bug 3547) - Crash when loading a profile. (Bug 3640) - The proto,colinfo tap doesn't work if the INFO column isn't being printed. (Bug 3675) - Flow Graph adds too much unnecessary garbage. (Bug 3693) - The EAP Diameter dictionary file was missing in the distribution. (Bug 3761) - Graph analysis window is behind other window. (Bug 3773) - IKEv2 Cert Request payload dissection error. (Bug 3782) - DNS NAPTR RR (RFC 3403) replacement MUST be a fully qualified domain-name. (Bug 3792) - Malformed RTCP Packet error while sending Payload specific RTCP feedback packet( as per RFC 4585). (Bug 3800) - 802.11n Block Ack packet Bitmap field missing. (Bug 3806) - Wireshark doesn't decode WBXML/ActiveSync information correctly. (Bug 3811) - Malformed packet when IPv6 packet has Next Header == 59. (Bug 3820) - Wireshark could crash while reading an ERF file. (Bug 3849) - Minor errors in gsm rr dissectors. (Bug 3889) - WPA Decryption Issues. (Bug 3890) - GSM A RR sys info dissection problem. (Bug 3901) - GSM A RR inverts MEAS-VALID values. (Bug 3915) - PDML output leaks ~300 bytes / packet. (Bug 3913) - Incorrect station identifier parsing in Kingfisher dissector. (Bug 3946) - DHCPv6, Vendor-Specific Informantion, SubOption"Option Request" parser incorrect. (Bug 3987) - Wireshark could leak memory while analyzing SSL. - Wireshark could crash while updating menu items after reading a file in some cases. - The Mac OS X ChmodBPF script now works correctly under Snow Leopard. - Updated Protocol Support DCERPC, DHCPv6, DNS, E.212, GSM A RR, GTPv2, H.248, IEEE 802.11, IPMI, ISAKMP/IKE, ISUP, Kingfisher, LDAP, OpcUA, RTCP, SCTP, SIP, SSL, TCP, WBXML, ZRTP - Updated Capture File Support ERF
9 lines
491 B
Text
9 lines
491 B
Text
$NetBSD: distinfo,v 1.24 2009/09/19 06:36:18 tron Exp $
|
|
|
|
SHA1 (wireshark-1.2.2.tar.bz2) = ad73bf93096344341cd7c99614816555bebdbf45
|
|
RMD160 (wireshark-1.2.2.tar.bz2) = 6adbd80e3027a63b456b971edba0185411d30546
|
|
Size (wireshark-1.2.2.tar.bz2) = 15186702 bytes
|
|
SHA1 (patch-aa) = d0744f069ac2d3a8a43b810e1f958360d99200a9
|
|
SHA1 (patch-ab) = 5ae79916603f04c2d362c764d39f0c99728e716c
|
|
SHA1 (patch-ac) = 4e985520ea4b118aea6fc001f256b5de96de7840
|
|
SHA1 (patch-ad) = fa293d23390d015d0863367033ab07a3472430de
|