Wireshark-users: [Wireshark-users] Wireshark 2.2.14 is now available
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Tue, 3 Apr 2018 14:46:25 -0700
I'm proud to announce the release of Wireshark 2.2.14. __________________________________________________________________ What is Wireshark? Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. __________________________________________________________________ What's New Bug Fixes The following vulnerabilities have been fixed: * [1]wnpa-sec-2018-15 The MP4 dissector could crash. ([2]Bug 13777) * [3]wnpa-sec-2018-16 The ADB dissector could crash. ([4]Bug 14460) * [5]wnpa-sec-2018-17 The IEEE 802.15.4 dissector could crash. ([6]Bug 14468) * [7]wnpa-sec-2018-18 The NBAP dissector could crash. ([8]Bug 14471) * [9]wnpa-sec-2018-19 The VLAN dissector could crash. ([10]Bug 14469) * [11]wnpa-sec-2018-20 The LWAPP dissector could crash. ([12]Bug 14467) * [13]wnpa-sec-2018-23 The Kerberos dissector could crash. ([14]Bug 14576) * [15]wnpa-sec-2018-24 Multiple dissectors and other modules could leak memory. The TN3270 ([16]Bug 14480), ISUP ([17]Bug 14481), LAPD ([18]Bug 14482), SMB2 ([19]Bug 14483), GIOP ([20]Bug 14484), ASN.1 ([21]Bug 14485), MIME multipart ([22]Bug 14486), H.223 ([23]Bug 14487), and PCP ([24]Bug 14488) dissectors were susceptible along with Wireshark and TShark ([25]Bug 14489). The following bugs have been fixed: * Lua script calling Ethernet dissector runs OK in 1.12.4 but crashes in later releases. ([26]Bug 14293) * PEEKREMOTE dissector lacks 80mhz support, short preamble support and spatial streams encoding. ([27]Bug 14452) * Typo error in enumeration value of speech version identifier. ([28]Bug 14528) * WCCP logical error in CHECK_LENGTH_ADVANCE_OFFSET macros. ([29]Bug 14538) * Buildbot crash output: fuzz-2018-03-19-19114.pcap. ([30]Bug 14544) * alloca() used in wsutil/getopt_long.c without <alloca.h> inclusion. ([31]Bug 14552) * HP-UX HP ANSI C requires -Wp,-H200000 flag to compile. ([32]Bug 14554) * Makefile.in uses non-portable "install" command. ([33]Bug 14555) * HP-UX HP ANSI C doesn't support assigning {} to a variable in epan/app_mem_usage.c. ([34]Bug 14556) * PPP in SSTP, HDLC framing not parsed properly. ([35]Bug 14559) * Using the DIAMETER dictionary causes the standard input to be closed when the dictionary is read. ([36]Bug 14577) New and Updated Features There are no new features in this release. New File Format Decoding Support There are no new file formats in this release. New Protocol Support There are no new protocols in this release. Updated Protocol Support 6LoWPAN, ADB, DNS, Ethernet, GIOP, GSM BSSMAP, H.223, IEEE 802.11, IEEE 802.11 Radiotap, IEEE 802.15.4, ISUP, Kerberos, LAPD, LWAPP, MIME multipart, MP4, NBAP, PCP, PEEKREMOTE, S1AP, SMB2, SSTP, T.30, TN3270, VLAN, WCCP, and WSP New and Updated Capture File Support There is no new or updated capture file support in this release. New and Updated Capture Interfaces support There are no new or updated capture interfaces supported in this release. Major API Changes There are no major API changes in this release. __________________________________________________________________ Getting Wireshark Wireshark source code and installation packages are available from [37]https://www.wireshark.org/download.html. Vendor-supplied Packages Most Linux and Unix vendors supply their own Wireshark packages. You can usually install or upgrade Wireshark using the package management system specific to that platform. A list of third-party packages can be found on the [38]download page on the Wireshark web site. __________________________________________________________________ File Locations Wireshark and TShark look in several different locations for preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform to platform. You can use About->Folders to find the default locations on your system. __________________________________________________________________ Known Problems Dumpcap might not quit if Wireshark or TShark crashes. ([39]Bug 1419) The BER dissector might infinitely loop. ([40]Bug 1516) Capture filters aren't applied when capturing from named pipes. ([41]Bug 1814) Filtering tshark captures with read filters (-R) no longer works. ([42]Bug 2234) Application crash when changing real-time option. ([43]Bug 4035) Wireshark and TShark will display incorrect delta times in some cases. ([44]Bug 4985) Wireshark should let you work with multiple capture files. ([45]Bug 10488) __________________________________________________________________ Getting Help Community support is available on [46]Wireshark's Q&A site and on the wireshark-users mailing list. Subscription information and archives for all of Wireshark's mailing lists can be found on [47]the web site. Official Wireshark training and certification are available from [48]Wireshark University. __________________________________________________________________ Frequently Asked Questions A complete FAQ is available on the [49]Wireshark web site. __________________________________________________________________ Last updated 2018-04-03 20:05:23 UTC References 1. https://www.wireshark.org/security/wnpa-sec-2018-15.html 2. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777 3. https://www.wireshark.org/security/wnpa-sec-2018-16.html 4. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460 5. https://www.wireshark.org/security/wnpa-sec-2018-17.html 6. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468 7. https://www.wireshark.org/security/wnpa-sec-2018-18.html 8. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471 9. https://www.wireshark.org/security/wnpa-sec-2018-19.html 10. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469 11. https://www.wireshark.org/security/wnpa-sec-2018-20.html 12. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467 13. https://www.wireshark.org/security/wnpa-sec-2018-23.html 14. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576 15. https://www.wireshark.org/security/wnpa-sec-2018-24.html 16. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480 17. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481 18. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482 19. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483 20. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484 21. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485 22. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486 23. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487 24. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488 25. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489 26. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14293 27. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14452 28. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14528 29. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14538 30. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14544 31. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14552 32. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14554 33. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14555 34. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14556 35. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14559 36. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14577 37. https://www.wireshark.org/download.html 38. https://www.wireshark.org/download.html#thirdparty 39. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419 40. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1516 41. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1814 42. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2234 43. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4035 44. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4985 45. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10488 46. https://ask.wireshark.org/ 47. https://www.wireshark.org/lists/ 48. http://www.wiresharktraining.com/ 49. https://www.wireshark.org/faq.html Digests wireshark-2.2.14.tar.bz2: 32445055 bytes SHA256(wireshark-2.2.14.tar.bz2)=e7a3d4f9bbde20ea5ee09103f9f6dba38e3666dfe1d6a6a1c004602b5fac378b RIPEMD160(wireshark-2.2.14.tar.bz2)=18e91fe0c2b9642d09e8ba52c0c35b46de15aa70 SHA1(wireshark-2.2.14.tar.bz2)=9c1cd205f5755566d363c8f273c3a322e6cfd90b Wireshark-win32-2.2.14.exe: 44651736 bytes SHA256(Wireshark-win32-2.2.14.exe)=6e3b62e24a686aab21af7bdf2cc6582bb95f8e8a861213aa19930dd2bba4cfb5 RIPEMD160(Wireshark-win32-2.2.14.exe)=31f80a3f7f2c0aec49e7018e798187526de092b7 SHA1(Wireshark-win32-2.2.14.exe)=e01610f52c79e2172137da1530eb27c4bb49d7ef Wireshark-win64-2.2.14.exe: 56153200 bytes SHA256(Wireshark-win64-2.2.14.exe)=131e9b6f6ed9b2409af296d6ce9cc3f181ff8aa1ca444ab91d7358bbcdfa4596 RIPEMD160(Wireshark-win64-2.2.14.exe)=e7354160b235f0824ab8d4d78a8673955d4cb068 SHA1(Wireshark-win64-2.2.14.exe)=daf03c16f75d6d15422aa97c85a5e630a44048b3 WiresharkPortable_2.2.14.paf.exe: 46294176 bytes SHA256(WiresharkPortable_2.2.14.paf.exe)=219639bae69591010b68047d9e2211662ac01195bf3a27c831e2165bf630af11 RIPEMD160(WiresharkPortable_2.2.14.paf.exe)=f5234236a8c4145d4a03dfd31367a0ed756e41fe SHA1(WiresharkPortable_2.2.14.paf.exe)=a4b3b6ad7a5b4b6e7c97924aaf4b0e99c67bea27 Wireshark 2.2.14 Intel 64.dmg: 40002647 bytes SHA256(Wireshark 2.2.14 Intel 64.dmg)=99732e2127e1ad5b5f11da8c9f6756a0a531601e02ff942b33e563dc76c7ff08 RIPEMD160(Wireshark 2.2.14 Intel 64.dmg)=5bb642f3f6a4f6201996310673b4b52631ad2e08 SHA1(Wireshark 2.2.14 Intel 64.dmg)=9d204c7e9d5174b3ea54ac8a2e5b98ac2b8ac36e You can validate these hashes using the following commands (among others): Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256 Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg" Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
signature.asc
Description: OpenPGP digital signature
- Prev by Date: [Wireshark-users] Wireshark 2.4.6 is now available
- Next by Date: [Wireshark-users] GDB Remote Serial Protocol
- Previous by thread: [Wireshark-users] Wireshark 2.4.6 is now available
- Next by thread: [Wireshark-users] GDB Remote Serial Protocol
- Index(es):