Wireshark-users: [Wireshark-users] Wireshark 2.2.2 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 16 Nov 2016 15:43:16 -0800
I'm proud to announce the release of Wireshark 2.2.2. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2016-58 Profinet I/O long loop. ([2]Bug 12851) * [3]wnpa-sec-2016-59 AllJoyn crash. ([4]Bug 12953) * [5]wnpa-sec-2016-60 OpenFlow crash. ([6]Bug 13071) * [7]wnpa-sec-2016-61 DCERPC crash. ([8]Bug 13072) * [9]wnpa-sec-2016-62 DTN infinite loop. ([10]Bug 13097) The Windows PortableApps packages were susceptible to a [11]DLL hijacking flaw. The following bugs have been fixed: * TCP: nextseq incorrect if TCP_MAX_UNACKED_SEGMENTS exceeded & FIN true. ([12]Bug 12579) * SMPP schedule_delivery_time displayed wrong in Wireshark 2.1.0. ([13]Bug 12632) * Upgrading to latest version uninstalls Microsoft Visual C++ redistributable. ([14]Bug 12712) * dmg for OS X does not install man pages. ([15]Bug 12746) * Fails to compile against Heimdal 1.5.3. ([16]Bug 12831) * TCP: Next sequence number off by one when sending payload in SYN packet (e.g. TFO). ([17]Bug 12838) * Follow TCP Stream shows duplicate stream data. ([18]Bug 12855) * Dissection engine falsely asserts that EIGRP packet's checksum is incorrect. ([19]Bug 12982) * IEEE 802.15.4 frames erroneously handed over to ZigBee dissector. ([20]Bug 12984) * Capture Filter Bookmark Inactive in Capture Options page. ([21]Bug 12986) * CLNP dissector does not parse ER NPDU properly. ([22]Bug 12993) * SNMP trap bindings for NON scalar OIDs. ([23]Bug 13013) * BGP LS Link Protection Type TLV (1093) decoding. ([24]Bug 13021) * Application crash sorting column for tcp.window_size_scalefactor up and down. ([25]Bug 13023) * ZigBee Green Power add key during execution. ([26]Bug 13031) * Malformed AMPQ packets for session.expected and session.confirmed fields. ([27]Bug 13037) * Wireshark 2.2.1 crashes when attempting to merge pcap files. ([28]Bug 13060) * [IS-637A] SMS - Teleservice layer parameter --> IA5 encoded text is not correctly displayed. ([29]Bug 13065) * * Failure to dissect USB Audio feature unit descriptors missing the iFeature field. ([30]Bug 13085) * MSISDN not populated/decoded in JSON GTP-C decoding. ([31]Bug 13086) * E212: 3 digits MNC are identified as 2 digits long if they end with a 0. ([32]Bug 13092) * Exception with last unknown Cisco AVP available in a SCCRQ message. ([33]Bug 13103) * TShark stalls on FreeBSD if androiddump is present. ([34]Bug 13104) * Dissector skips DICOM command. ([35]Bug 13110) * UUID (FT_GUID) filtering isn't working. ([36]Bug 13121) * Manufacturer name resolution fail. ([37]Bug 13126) * packet-sdp.c allocates transport_info->encoding_name from wrong memory pool. ([38]Bug 13127) * Payload type name for dynamic payload is wrong for reverse RTP channels. ([39]Bug 13132) New and Updated Features There are no new features in this release. New File Format Decoding Support There are no new file formats in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support 6LoWPAN, AllJoyn, AMPQ, ANSI IS-637 A, BGP, CLNP, DCERPC, DICOM, DTN, E.212, EIGRP, ERF, GVSP, IEEE 802.11, IEEE 802.15.4, IP, ISO-8583, Kerberos, L2TP, LACP, MAC LTE, OpenFlow, Profinet I/O, RTPS, SCTP, SDP, Skype, SMPP, SNA, SNMP, SPNEGO, TCP, USB Audio, XML, and ZigBee New and Updated Capture File Support New and Updated Capture Interfaces support There are no new or updated capture interfaces supported in this release. Major API Changes There are no major API changes in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [40]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [41]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([42]Bug 1419) The BER dissector might infinitely loop. ([43]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([44]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([45]Bug 2234) Application crash when changing real-time option. ([46]Bug 4035) Packet list rows are oversized. ([47]Bug 4357) Wireshark and TShark will display incorrect delta times in some cases. ([48]Bug 4985) Wireshark should let you work with multiple capture files. ([49]Bug 10488) Dell Backup and Recovery (DBAR) makes many Windows applications crash, including Wireshark. ([50]Bug 12036) __________________________________________________________________ Getting Help Community support is available on [51]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [52]the web site. Official Wireshark training and certification are available from [53]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [54]Wireshark web site. __________________________________________________________________ Last updated 2016-11-16 21:24:29 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2016-58.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851 3. https://www.wireshark.org/security/wnpa-sec-2016-59.html 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12953 5. https://www.wireshark.org/security/wnpa-sec-2016-60.html 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071 7. https://www.wireshark.org/security/wnpa-sec-2016-61.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13072 9. https://www.wireshark.org/security/wnpa-sec-2016-62.html 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13097 11. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12724 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12579 13. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12632 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12712 15. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12746 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12831 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12838 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12855 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12982 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12984 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12986 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12993 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13013 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13021 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13023 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13031 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13037 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13060 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13065 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13085 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13086 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13092 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13103 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13104 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13110 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13121 37. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13126 38. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13127 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13132 40. https://www.wireshark.org/download.html 41. https://www.wireshark.org/download.html#thirdparty 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 46. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 47. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4357 48. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 49. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 50. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12036 51. https://ask.wireshark.org/ 52. https://www.wireshark.org/lists/ 53. http://www.wiresharktraining.com/ 54. https://www.wireshark.org/faq.html Digests wireshark-2.2.2.tar.bz2: 32230208 bytes SHA256(wireshark-2.2.2.tar.bz2)=f9acef5e9a9021a400b4244fafc06969f41ec594ec57fd7f0ff63bafca0055b3 RIPEMD160(wireshark-2.2.2.tar.bz2)=8aafc482c9ee55f18a0c57e7afaabeccc35a9551 SHA1(wireshark-2.2.2.tar.bz2)=b92a292b95e2ea010014364ff513d86afdc8e5a6 MD5(wireshark-2.2.2.tar.bz2)=88bb55bcbc5249fee10bcea332a4fece Wireshark-win64-2.2.2.exe: 49242104 bytes SHA256(Wireshark-win64-2.2.2.exe)=82f16ee36c52f6a6a499ba1da041dea9f42c57136db2f098ff3334111a2a551f RIPEMD160(Wireshark-win64-2.2.2.exe)=6d601ac82d13e29f2cc8979ad4c67aa73a463876 SHA1(Wireshark-win64-2.2.2.exe)=922e4c64cacae067302af3c03925448b4220691d MD5(Wireshark-win64-2.2.2.exe)=8beb53d8fcd80b40e0ed732fa041346d Wireshark-win32-2.2.2.exe: 44413152 bytes SHA256(Wireshark-win32-2.2.2.exe)=89b6dd104f5675cdd50a7122f11f96faef3f942e4acd9c76add96b321d00a7e3 RIPEMD160(Wireshark-win32-2.2.2.exe)=ff17090597168fbd203664fd47a4696c78b64d62 SHA1(Wireshark-win32-2.2.2.exe)=9385b558c121fe600d5b33cf4b7c81b465c76c8e MD5(Wireshark-win32-2.2.2.exe)=f32e56954c79ac7377e3807b437ea135 WiresharkPortable_2.2.2.paf.exe: 45991128 bytes SHA256(WiresharkPortable_2.2.2.paf.exe)=12d1213aa45488527b92bbebc59b53036d01759baea342707350134eb6fa8c0e RIPEMD160(WiresharkPortable_2.2.2.paf.exe)=a828e0bfca53ba774f9b38e6acff47e9e4b72e90 SHA1(WiresharkPortable_2.2.2.paf.exe)=f50a56ebab5570a7dac52f98baa94f96a292bedd MD5(WiresharkPortable_2.2.2.paf.exe)=764fc52150e9ae6aea561fb8c6cead30 Wireshark 2.2.2 Intel 64.dmg: 32842516 bytes SHA256(Wireshark 2.2.2 Intel 64.dmg)=acbe9372ec868a673cd609523779a2bae836e1950536a328b5a688d2f1d603f7 RIPEMD160(Wireshark 2.2.2 Intel 64.dmg)=eab1c002eff37111a8877a0b473e13a7b8e2c371 SHA1(Wireshark 2.2.2 Intel 64.dmg)=ca778df467dd77c452b1dead476b2b1e5c9c9042 MD5(Wireshark 2.2.2 Intel 64.dmg)=e9cdf2b1c6db7b1eed1a769c61b1f769
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-users] Wireshark 2.0.8 is now available
- Next by Date: [Wireshark-users] Wide char strings in LUA dissector
- Previous by thread: [Wireshark-users] Wireshark 2.0.8 is now available
- Next by thread: [Wireshark-users] Wide char strings in LUA dissector
- Index(es):